Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
product sample requirement.exe

Overview

General Information

Sample name:product sample requirement.exe
Analysis ID:1560738
MD5:07d5a83558349a82cfa1dc6d68f4d84b
SHA1:064af18045030703bc4c62c99f1abe5700832e8a
SHA256:096b33571e80d18c1763a3bd5d019e3177f1547b3ca6e6205a349075ce2fec18
Tags:exemalwareuser-Joker
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Scheduled temp file as task from temp location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
C2 URLs / IPs found in malware configuration
Injects a PE file into a foreign processes
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Uses schtasks.exe or at.exe to add and modify task schedules
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Add Scheduled Task Parent
Sigma detected: Suspicious Schtasks From Env Var Folder
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • product sample requirement.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\product sample requirement.exe" MD5: 07D5A83558349A82CFA1DC6D68F4D84B)
    • powershell.exe (PID: 2032 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powershell.exe (PID: 1136 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 5812 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • WmiPrvSE.exe (PID: 7368 cmdline: C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding MD5: 60FF40CFD7FB8FE41EE4FE9AE5FE1C51)
    • schtasks.exe (PID: 7048 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 4280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • TWmzcmqkuotC.exe (PID: 7340 cmdline: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe MD5: 07D5A83558349A82CFA1DC6D68F4D84B)
    • schtasks.exe (PID: 7540 cmdline: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7548 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • TWmzcmqkuotC.exe (PID: 7592 cmdline: "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe" MD5: 07D5A83558349A82CFA1DC6D68F4D84B)
  • cleanup
{"C2 url": ["teebro1800.dynamic-dns.net"], "Port": 2195, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
SourceRuleDescriptionAuthorStrings
0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
    0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0x6aa8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0x6b45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0x6c5a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0x691a:$cnc4: POST / HTTP/1.1
    00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
      00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0x91d0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x114b0:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x19d4c:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0x926d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x1154d:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x19de9:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0x9382:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x11662:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x19efe:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0x9042:$cnc4: POST / HTTP/1.1
      • 0x11322:$cnc4: POST / HTTP/1.1
      • 0x19bbe:$cnc4: POST / HTTP/1.1
      00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        Click to see the 6 entries
        SourceRuleDescriptionAuthorStrings
        0.2.product sample requirement.exe.27e0bd4.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
          0.2.product sample requirement.exe.27e0bd4.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
          • 0x4ea8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
          • 0x4f45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
          • 0x505a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
          • 0x4d1a:$cnc4: POST / HTTP/1.1
          9.2.TWmzcmqkuotC.exe.2a48528.1.unpackJoeSecurity_XWormYara detected XWormJoe Security
            9.2.TWmzcmqkuotC.exe.2a48528.1.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0x4ea8:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0x4f45:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0x505a:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0x4d1a:$cnc4: POST / HTTP/1.1
            9.2.TWmzcmqkuotC.exe.2a50808.2.unpackJoeSecurity_XWormYara detected XWormJoe Security
              Click to see the 16 entries

              System Summary

              barindex
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\product sample requirement.exe", ParentImage: C:\Users\user\Desktop\product sample requirement.exe, ParentProcessId: 6576, ParentProcessName: product sample requirement.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", ProcessId: 2032, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\product sample requirement.exe", ParentImage: C:\Users\user\Desktop\product sample requirement.exe, ParentProcessId: 6576, ParentProcessName: product sample requirement.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", ProcessId: 2032, ProcessName: powershell.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe, ParentImage: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe, ParentProcessId: 7340, ParentProcessName: TWmzcmqkuotC.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp", ProcessId: 7540, ProcessName: schtasks.exe
              Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\product sample requirement.exe", ParentImage: C:\Users\user\Desktop\product sample requirement.exe, ParentProcessId: 6576, ParentProcessName: product sample requirement.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", ProcessId: 7048, ProcessName: schtasks.exe
              Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\product sample requirement.exe", ParentImage: C:\Users\user\Desktop\product sample requirement.exe, ParentProcessId: 6576, ParentProcessName: product sample requirement.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe", ProcessId: 2032, ProcessName: powershell.exe

              Persistence and Installation Behavior

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", CommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", CommandLine|base64offset|contains: *j, Image: C:\Windows\SysWOW64\schtasks.exe, NewProcessName: C:\Windows\SysWOW64\schtasks.exe, OriginalFileName: C:\Windows\SysWOW64\schtasks.exe, ParentCommandLine: "C:\Users\user\Desktop\product sample requirement.exe", ParentImage: C:\Users\user\Desktop\product sample requirement.exe, ParentProcessId: 6576, ParentProcessName: product sample requirement.exe, ProcessCommandLine: "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp", ProcessId: 7048, ProcessName: schtasks.exe
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-11-22T09:18:32.444655+010028531931Malware Command and Control Activity Detected192.168.2.450032109.248.151.2212195TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: teebro1800.dynamic-dns.netAvira URL Cloud: Label: malware
              Source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["teebro1800.dynamic-dns.net"], "Port": 2195, "Aes key": "<123456789>", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Version": "XWorm V5.6"}
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeReversingLabs: Detection: 65%
              Source: product sample requirement.exeReversingLabs: Detection: 65%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeJoe Sandbox ML: detected
              Source: product sample requirement.exeJoe Sandbox ML: detected
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: teebro1800.dynamic-dns.net
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: 2195
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: <123456789>
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: <Xwormmm>
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: XWorm V5.6
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpackString decryptor: USB.exe
              Source: product sample requirement.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: product sample requirement.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: Binary string: WvTw.pdb source: product sample requirement.exe, TWmzcmqkuotC.exe.0.dr
              Source: Binary string: WvTw.pdbSHA256 source: product sample requirement.exe, TWmzcmqkuotC.exe.0.dr
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 4x nop then jmp 07154526h0_2_07154666
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 4x nop then jmp 06DD37F6h9_2_06DD3936

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2855924 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:49835 -> 109.248.151.221:2195
              Source: Network trafficSuricata IDS: 2853193 - Severity 1 - ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound : 192.168.2.4:50032 -> 109.248.151.221:2195
              Source: Malware configuration extractorURLs: teebro1800.dynamic-dns.net
              Source: Yara matchFile source: 0.2.product sample requirement.exe.276fe74.2.raw.unpack, type: UNPACKEDPE
              Source: global trafficTCP traffic: 192.168.2.4:49734 -> 109.248.151.221:2195
              Source: Joe Sandbox ViewASN Name: DATACLUBLV DATACLUBLV
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: teebro1800.dynamic-dns.net
              Source: product sample requirement.exe, 00000008.00000002.4126443765.0000000001136000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.mic
              Source: product sample requirement.exe, 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, product sample requirement.exe, 00000008.00000002.4127948271.0000000003141000.00000004.00000800.00020000.00000000.sdmp, TWmzcmqkuotC.exe, 00000009.00000002.1766752393.0000000002981000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: product sample requirement.exe, TWmzcmqkuotC.exe.0.drString found in binary or memory: http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmp, product sample requirement.exe, 00000000.00000002.1729533775.0000000005130000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn

              System Summary

              barindex
              Source: 0.2.product sample requirement.exe.27e0bd4.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.product sample requirement.exe.27d88f4.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 13.2.TWmzcmqkuotC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0.2.product sample requirement.exe.276fe74.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess Stats: CPU usage > 49%
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256D57C0_2_0256D57C
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_04CC00400_2_04CC0040
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_04CC003F0_2_04CC003F
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0534E9780_2_0534E978
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0534B12C0_2_0534B12C
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0534D8680_2_0534D868
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071543E80_2_071543E8
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071562200_2_07156220
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_07151F090_2_07151F09
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071506D80_2_071506D8
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071502A00_2_071502A0
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071A34B80_2_071A34B8
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071A21060_2_071A2106
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071A66780_2_071A6678
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071AF6780_2_071AF678
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071A66690_2_071A6669
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071AF2400_2_071AF240
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071AA2D10_2_071AA2D1
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_071ADE300_2_071ADE30
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 8_2_02F163508_2_02F16350
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 8_2_02F156788_2_02F15678
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 8_2_02F184D08_2_02F184D0
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 8_2_02F10BA08_2_02F10BA0
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 8_2_02F153308_2_02F15330
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_00EBD57C9_2_00EBD57C
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06DD36C89_2_06DD36C8
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06DD54F89_2_06DD54F8
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06DD06D89_2_06DD06D8
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06DD02A09_2_06DD02A0
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E134B89_2_06E134B8
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E100409_2_06E10040
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1F6619_2_06E1F661
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E166699_2_06E16669
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1F6709_2_06E1F670
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E166789_2_06E16678
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1A2D19_2_06E1A2D1
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1F2279_2_06E1F227
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1F2389_2_06E1F238
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1EE009_2_06E1EE00
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 9_2_06E1DCB09_2_06E1DCB0
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeCode function: 13_2_02960B9213_2_02960B92
              Source: product sample requirement.exe, 00000000.00000002.1731220498.0000000007270000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000002.1723277901.000000000082E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000002.1726250869.0000000003879000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameXClient.exe4 vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000000.1677959587.0000000000420000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameWvTw.exeP vs product sample requirement.exe
              Source: product sample requirement.exe, 00000000.00000002.1730907310.00000000070D0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs product sample requirement.exe
              Source: product sample requirement.exeBinary or memory string: OriginalFilenameWvTw.exeP vs product sample requirement.exe
              Source: product sample requirement.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: 0.2.product sample requirement.exe.27e0bd4.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.product sample requirement.exe.27d88f4.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 13.2.TWmzcmqkuotC.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0.2.product sample requirement.exe.276fe74.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
              Source: product sample requirement.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: TWmzcmqkuotC.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, AlgorithmAES.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Helper.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, J2rLQ5Ba9pr58NDIa7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, J2rLQ5Ba9pr58NDIa7.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: _0020.AddAccessRule
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: _0020.SetAccessControl
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, BBG68ril99edvlsaCS.csSecurity API names: _0020.AddAccessRule
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, ClientSocket.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.evad.winEXE@19/15@8/1
              Source: C:\Users\user\Desktop\product sample requirement.exeFile created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5812:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4280:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7548:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:708:120:WilError_03
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMutant created: \Sessions\1\BaseNamedObjects\zIEdvXAXTNmur
              Source: C:\Users\user\Desktop\product sample requirement.exeMutant created: \Sessions\1\BaseNamedObjects\wyDwhmVwMImivlWa
              Source: C:\Users\user\Desktop\product sample requirement.exeFile created: C:\Users\user\AppData\Local\Temp\tmpA26.tmpJump to behavior
              Source: product sample requirement.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: product sample requirement.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
              Source: C:\Users\user\Desktop\product sample requirement.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: product sample requirement.exeReversingLabs: Detection: 65%
              Source: C:\Users\user\Desktop\product sample requirement.exeFile read: C:\Users\user\Desktop\product sample requirement.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\product sample requirement.exe "C:\Users\user\Desktop\product sample requirement.exe"
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Users\user\Desktop\product sample requirement.exe "C:\Users\user\Desktop\product sample requirement.exe"
              Source: unknownProcess created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\wbem\WmiPrvSE.exe C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp"
              Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Users\user\Desktop\product sample requirement.exe "C:\Users\user\Desktop\product sample requirement.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: avicap32.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: msvfw32.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: gpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: slc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: fastprox.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: ncobjapi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wbemcomn.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mpclient.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: userenv.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: version.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: msasn1.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: wmitomi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: mi.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: miutils.dll
              Source: C:\Windows\System32\wbem\WmiPrvSE.exeSection loaded: gpapi.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dll
              Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: mscoree.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: kernel.appcore.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: version.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: vcruntime140_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: ucrtbase_clr0400.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: uxtheme.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: cryptsp.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: rsaenh.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: cryptbase.dll
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeSection loaded: sspicli.dll
              Source: C:\Users\user\Desktop\product sample requirement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: C:\Users\user\Desktop\product sample requirement.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
              Source: product sample requirement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: product sample requirement.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: product sample requirement.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: WvTw.pdb source: product sample requirement.exe, TWmzcmqkuotC.exe.0.dr
              Source: Binary string: WvTw.pdbSHA256 source: product sample requirement.exe, TWmzcmqkuotC.exe.0.dr

              Data Obfuscation

              barindex
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{Settings.Host,Settings.Port,Settings.SPL,Settings.KEY,Helper.ID()}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Messages.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{Pack[2],Helper.Decompress(Convert.FromBase64String(Pack[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, Messages.cs.Net Code: Memory
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, BBG68ril99edvlsaCS.cs.Net Code: yJHAHL1da8 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, BBG68ril99edvlsaCS.cs.Net Code: yJHAHL1da8 System.Reflection.Assembly.Load(byte[])
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, Messages.cs.Net Code: Memory
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, Messages.cs.Net Code: Memory
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Messages.cs.Net Code: Plugin System.AppDomain.Load(byte[])
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Messages.cs.Net Code: Memory System.AppDomain.Load(byte[])
              Source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, Messages.cs.Net Code: Memory
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256C3F1 push cs; ret 0_2_0256C3FE
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256A0D8 push edx; ret 0_2_0256A0E7
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256C658 push es; ret 0_2_0256C666
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256C4D9 push cs; ret 0_2_0256C4E6
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_025696F0 pushfd ; ret 0_2_025696FE
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_0256B7F8 push ebx; ret 0_2_0256B80F
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_02565E88 pushfd ; ret 0_2_02565F26
              Source: C:\Users\user\Desktop\product sample requirement.exeCode function: 0_2_04CC5847 push ss; ret 0_2_04CC5849
              Source: product sample requirement.exeStatic PE information: section name: .text entropy: 7.914229382691976
              Source: TWmzcmqkuotC.exe.0.drStatic PE information: section name: .text entropy: 7.914229382691976
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, wf7pIcJpDXjZPhmdcR.csHigh entropy of concatenated method names: 'Dispose', 'dFvMsmJLYy', 'uMpZE2RChT', 'ld6PxmeM0k', 'WVZMDaBj5l', 'UWhMzAi2mt', 'ProcessDialogKey', 'ElNZKAnrwU', 'ED8ZMIYuk5', 'XetZZj3TX0'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, lahKsNlJhvfR5sOQsC.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DAPZsoHdlV', 'SlWZDG6oyT', 'qYBZzua41o', 'QIHtKxnD74', 'QkstMOaKVe', 'sgStZZ2WmW', 'fUottI3Mjh', 'AsYiRLQACHGfIoaCAVM'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, CIuvfcMMUIGohnXtuRN.csHigh entropy of concatenated method names: 'HnmFDRlPTb', 'VCQFzcrO9x', 'Cn8uKNaDJY', 'pNRuManQTB', 'MyLuZ3vJhy', 'Y3butqtZqv', 'BKhuApHUEB', 'a8uu8inxR0', 'CECu9HNeap', 'ztduJyb4xV'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, L3TX0hDPpaonn1Z3cI.csHigh entropy of concatenated method names: 'S4jFlZ2m69', 'X9UFQcg7LD', 'c7iFcdwDX5', 'B85Fpp0qOi', 'rhuF3Hdgxt', 'nbLFi4FEDH', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, YNQMIuZR96mk1bBJra.csHigh entropy of concatenated method names: 'PLyH8tOMY', 'DGtbIXAcH', 'A2joVDswW', 'jwAYdtTVH', 'V9Yer39oL', 'A1lxNaNly', 'dTvI7s77beZreynCGV', 'eYK5PXS1GTBuV8B1s4', 'EAAvQ5jGv', 'A19FFGDBD'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, DyEgUQzn4oBAjYcrSs.csHigh entropy of concatenated method names: 'O5eFo9Hyoc', 'uYQFBpdyZe', 'T2bFeyK1aU', 'bkKF5vXSDA', 'FI6FEWHBUV', 'zjnFhssLdx', 'u52FPZ2bIU', 'aToFrm83q3', 'eatF1Ay81e', 'exUFGLSTGg'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, J2rLQ5Ba9pr58NDIa7.csHigh entropy of concatenated method names: 'zoeJRHGRim', 'sP5JXT4s7B', 'vpoJwUNE0p', 'EwpJg6mZSD', 'XFMJINy3o3', 'VcnJkJmUXS', 'OhIJ0S27D9', 'rXyJq9YyCo', 'DagJsbrBTT', 'YSZJDodO9D'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, bhqlRWMAgHg9OOlfpUx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VGJ23H2JbA', 'Jyr2FqTVGr', 'LWr2uLqqse', 'X4022dSGxv', 'B9D2CENxlq', 'OMw2dJeQVL', 'j0p2rhVV15'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, b97t5sLblaohbYs4QH.csHigh entropy of concatenated method names: 'x616BvVq4f', 'p3i6efvD7N', 'TR565yWpyZ', 'oZK6Ewm0wd', 'Jtn6hpKt8U', 'Cat6P5TfFp', 'xAX6jCIrn4', 'iiq6VxHJ5a', 'L8o6fa5Wq1', 'D5M6SNu92I'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, iEUq6ejrWBbLc1BIGt.csHigh entropy of concatenated method names: 'KQMp9qxBox', 'B43pl4YtBq', 'XuEpc8tBEJ', 'gsTcD2bnKP', 'KnkczL6eQB', 'Wq3pKjnCaq', 'fX5pMsG78c', 'G4SpZvrItr', 'ggEptlGlZf', 'IJapAHSOkA'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, oAnrwUseD8IYuk5set.csHigh entropy of concatenated method names: 'aIE35qQ056', 'ojI3E3Wfl1', 'JjM3m7dOFb', 'Y5r3hHeH6P', 'JKE3P10v2x', 'Rbb3UCWYtv', 'eI53jfjU1b', 'XgK3V4ipEk', 'bDh3y7FfZC', 'Gi93fPSPhX'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, bQmIQewe4KykYYO3Rt.csHigh entropy of concatenated method names: 'ToString', 'e7dWSyeir8', 'cMKWEyrTsv', 'HpVWmAYapV', 'SuhWh2tv7d', 'vwZWPov9L5', 'dKJWUMMrRv', 'ShhWjIuYDD', 'ERvWVXFKx8', 'n1xWyXxW4Q'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, JBquDIkTJBCKCHfOX3.csHigh entropy of concatenated method names: 'zylTqxQRaI', 'evTTDfDOJB', 'tvAvKWRhHR', 'efcvM4CF67', 'pSYTSjedom', 'zjeTa8b1P2', 'NseTLB8iZL', 'zKcTRUBovr', 'zV9TXFvPVy', 'GA7TwqPK6T'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, pQCggtydJZWO9wRk8V.csHigh entropy of concatenated method names: 'Lfqp1PuoU8', 'hqSpGbRlR8', 'DWhpHpRojL', 'UXhpbZ3ajm', 'BJ1pOPjk92', 'Dt3povj60C', 'DuYpYgAnjp', 'KRppBBNMwf', 'FiMpexrqJH', 'XjbpxqMgHF'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, wjJ0770SbtFvmJLYy0.csHigh entropy of concatenated method names: 'Nr93NL2UjN', 'MVj3TjWi8o', 'LNu33YjNcS', 'NH33uqnF5f', 'gE23CHsGUA', 'NBb3r85SZO', 'Dispose', 'N5Ev9n9t8N', 'qCYvJd1D7E', 'yEDvlhmIc1'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, t2xSoI5OIPqG3Emstu.csHigh entropy of concatenated method names: 'lGyc8pO2Lu', 'V2kcJ6DXCZ', 'YcOcQ3cQwX', 'zM1cpc13YM', 'EKacieE2Bg', 'xW4QIqAskj', 'r8tQkK4PPO', 'DyVQ0BOv5e', 'wlRQqLKyNx', 'EgoQsI2Zb9'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, BBG68ril99edvlsaCS.csHigh entropy of concatenated method names: 'bAct8pHDaF', 'BdCt9rWjKG', 'pYutJZ3bnN', 'OqftlW6EId', 'NUptQAqTcY', 'fF3tcBBTQY', 'YQUtppk3Ji', 'xBXtieBXw2', 'apRt4QOr0W', 'pXnt7UVEtI'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, uFsj5WRoiYsTfJXB4I.csHigh entropy of concatenated method names: 'zcLNfDwbQQ', 'QOiNaBdTgB', 'SkyNRVpuGj', 'phmNXnjtTR', 'WCnNEXhOrU', 'xJLNmZ1Msu', 'AjDNhX1SpF', 'YyFNPdjKFW', 'bUINUEIUvu', 'XtDNj5qGMg'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, nh2UCue7G7vdMMX7Dg.csHigh entropy of concatenated method names: 'ebelbpT0u9', 'eCQloG2nZO', 'ENilBkvJWB', 'fHTleL9pda', 'IQAlNYseh2', 'xP6lWFdrSW', 'dpNlTmxgae', 'BgSlv8aajo', 'M1ul3ehYjQ', 'lY9lFt668F'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, WOiRsLxcY7rY5d8atk.csHigh entropy of concatenated method names: 'Fw4QOOOorS', 'XhdQY0wj6s', 'DmllmTXttf', 'DB8lhkreYZ', 'maRlPU9iZD', 'TJylU1GIGX', 'pgmljARcFg', 'itZlV0Hx4g', 'wU1lyxSreb', 'UUOlfEiAgV'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, KQFy4hAZGpktWxQ9X2.csHigh entropy of concatenated method names: 'KsPMp2rLQ5', 'P9pMir58ND', 't7GM77vdMM', 'R7DMngqOiR', 'w8aMNtkF2x', 'OoIMWOIPqG', 'x7xjQU0cSF9WN7y31K', 'HVl0x99XgMJ9M3WJPh', 'kUVMMaKJPm', 'oIlMteXdJT'
              Source: 0.2.product sample requirement.exe.7270000.5.raw.unpack, wZq0OkMKagw2smxV2ca.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'vaAFSwWYCm', 'EwlFaAm5An', 'e0bFLTmkT8', 'wy7FRb6Yag', 'KiFFXT3Zof', 'zPGFwA3wPY', 'MuMFgiq9mT'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, wf7pIcJpDXjZPhmdcR.csHigh entropy of concatenated method names: 'Dispose', 'dFvMsmJLYy', 'uMpZE2RChT', 'ld6PxmeM0k', 'WVZMDaBj5l', 'UWhMzAi2mt', 'ProcessDialogKey', 'ElNZKAnrwU', 'ED8ZMIYuk5', 'XetZZj3TX0'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, lahKsNlJhvfR5sOQsC.csHigh entropy of concatenated method names: 'EditValue', 'GetEditStyle', 'DAPZsoHdlV', 'SlWZDG6oyT', 'qYBZzua41o', 'QIHtKxnD74', 'QkstMOaKVe', 'sgStZZ2WmW', 'fUottI3Mjh', 'AsYiRLQACHGfIoaCAVM'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, CIuvfcMMUIGohnXtuRN.csHigh entropy of concatenated method names: 'HnmFDRlPTb', 'VCQFzcrO9x', 'Cn8uKNaDJY', 'pNRuManQTB', 'MyLuZ3vJhy', 'Y3butqtZqv', 'BKhuApHUEB', 'a8uu8inxR0', 'CECu9HNeap', 'ztduJyb4xV'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, L3TX0hDPpaonn1Z3cI.csHigh entropy of concatenated method names: 'S4jFlZ2m69', 'X9UFQcg7LD', 'c7iFcdwDX5', 'B85Fpp0qOi', 'rhuF3Hdgxt', 'nbLFi4FEDH', 'Next', 'Next', 'Next', 'NextBytes'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, YNQMIuZR96mk1bBJra.csHigh entropy of concatenated method names: 'PLyH8tOMY', 'DGtbIXAcH', 'A2joVDswW', 'jwAYdtTVH', 'V9Yer39oL', 'A1lxNaNly', 'dTvI7s77beZreynCGV', 'eYK5PXS1GTBuV8B1s4', 'EAAvQ5jGv', 'A19FFGDBD'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, DyEgUQzn4oBAjYcrSs.csHigh entropy of concatenated method names: 'O5eFo9Hyoc', 'uYQFBpdyZe', 'T2bFeyK1aU', 'bkKF5vXSDA', 'FI6FEWHBUV', 'zjnFhssLdx', 'u52FPZ2bIU', 'aToFrm83q3', 'eatF1Ay81e', 'exUFGLSTGg'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, J2rLQ5Ba9pr58NDIa7.csHigh entropy of concatenated method names: 'zoeJRHGRim', 'sP5JXT4s7B', 'vpoJwUNE0p', 'EwpJg6mZSD', 'XFMJINy3o3', 'VcnJkJmUXS', 'OhIJ0S27D9', 'rXyJq9YyCo', 'DagJsbrBTT', 'YSZJDodO9D'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, bhqlRWMAgHg9OOlfpUx.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'VGJ23H2JbA', 'Jyr2FqTVGr', 'LWr2uLqqse', 'X4022dSGxv', 'B9D2CENxlq', 'OMw2dJeQVL', 'j0p2rhVV15'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, b97t5sLblaohbYs4QH.csHigh entropy of concatenated method names: 'x616BvVq4f', 'p3i6efvD7N', 'TR565yWpyZ', 'oZK6Ewm0wd', 'Jtn6hpKt8U', 'Cat6P5TfFp', 'xAX6jCIrn4', 'iiq6VxHJ5a', 'L8o6fa5Wq1', 'D5M6SNu92I'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, iEUq6ejrWBbLc1BIGt.csHigh entropy of concatenated method names: 'KQMp9qxBox', 'B43pl4YtBq', 'XuEpc8tBEJ', 'gsTcD2bnKP', 'KnkczL6eQB', 'Wq3pKjnCaq', 'fX5pMsG78c', 'G4SpZvrItr', 'ggEptlGlZf', 'IJapAHSOkA'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, oAnrwUseD8IYuk5set.csHigh entropy of concatenated method names: 'aIE35qQ056', 'ojI3E3Wfl1', 'JjM3m7dOFb', 'Y5r3hHeH6P', 'JKE3P10v2x', 'Rbb3UCWYtv', 'eI53jfjU1b', 'XgK3V4ipEk', 'bDh3y7FfZC', 'Gi93fPSPhX'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, bQmIQewe4KykYYO3Rt.csHigh entropy of concatenated method names: 'ToString', 'e7dWSyeir8', 'cMKWEyrTsv', 'HpVWmAYapV', 'SuhWh2tv7d', 'vwZWPov9L5', 'dKJWUMMrRv', 'ShhWjIuYDD', 'ERvWVXFKx8', 'n1xWyXxW4Q'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, JBquDIkTJBCKCHfOX3.csHigh entropy of concatenated method names: 'zylTqxQRaI', 'evTTDfDOJB', 'tvAvKWRhHR', 'efcvM4CF67', 'pSYTSjedom', 'zjeTa8b1P2', 'NseTLB8iZL', 'zKcTRUBovr', 'zV9TXFvPVy', 'GA7TwqPK6T'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, pQCggtydJZWO9wRk8V.csHigh entropy of concatenated method names: 'Lfqp1PuoU8', 'hqSpGbRlR8', 'DWhpHpRojL', 'UXhpbZ3ajm', 'BJ1pOPjk92', 'Dt3povj60C', 'DuYpYgAnjp', 'KRppBBNMwf', 'FiMpexrqJH', 'XjbpxqMgHF'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, wjJ0770SbtFvmJLYy0.csHigh entropy of concatenated method names: 'Nr93NL2UjN', 'MVj3TjWi8o', 'LNu33YjNcS', 'NH33uqnF5f', 'gE23CHsGUA', 'NBb3r85SZO', 'Dispose', 'N5Ev9n9t8N', 'qCYvJd1D7E', 'yEDvlhmIc1'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, t2xSoI5OIPqG3Emstu.csHigh entropy of concatenated method names: 'lGyc8pO2Lu', 'V2kcJ6DXCZ', 'YcOcQ3cQwX', 'zM1cpc13YM', 'EKacieE2Bg', 'xW4QIqAskj', 'r8tQkK4PPO', 'DyVQ0BOv5e', 'wlRQqLKyNx', 'EgoQsI2Zb9'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, BBG68ril99edvlsaCS.csHigh entropy of concatenated method names: 'bAct8pHDaF', 'BdCt9rWjKG', 'pYutJZ3bnN', 'OqftlW6EId', 'NUptQAqTcY', 'fF3tcBBTQY', 'YQUtppk3Ji', 'xBXtieBXw2', 'apRt4QOr0W', 'pXnt7UVEtI'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, uFsj5WRoiYsTfJXB4I.csHigh entropy of concatenated method names: 'zcLNfDwbQQ', 'QOiNaBdTgB', 'SkyNRVpuGj', 'phmNXnjtTR', 'WCnNEXhOrU', 'xJLNmZ1Msu', 'AjDNhX1SpF', 'YyFNPdjKFW', 'bUINUEIUvu', 'XtDNj5qGMg'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, nh2UCue7G7vdMMX7Dg.csHigh entropy of concatenated method names: 'ebelbpT0u9', 'eCQloG2nZO', 'ENilBkvJWB', 'fHTleL9pda', 'IQAlNYseh2', 'xP6lWFdrSW', 'dpNlTmxgae', 'BgSlv8aajo', 'M1ul3ehYjQ', 'lY9lFt668F'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, WOiRsLxcY7rY5d8atk.csHigh entropy of concatenated method names: 'Fw4QOOOorS', 'XhdQY0wj6s', 'DmllmTXttf', 'DB8lhkreYZ', 'maRlPU9iZD', 'TJylU1GIGX', 'pgmljARcFg', 'itZlV0Hx4g', 'wU1lyxSreb', 'UUOlfEiAgV'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, KQFy4hAZGpktWxQ9X2.csHigh entropy of concatenated method names: 'KsPMp2rLQ5', 'P9pMir58ND', 't7GM77vdMM', 'R7DMngqOiR', 'w8aMNtkF2x', 'OoIMWOIPqG', 'x7xjQU0cSF9WN7y31K', 'HVl0x99XgMJ9M3WJPh', 'kUVMMaKJPm', 'oIlMteXdJT'
              Source: 0.2.product sample requirement.exe.38a5f70.3.raw.unpack, wZq0OkMKagw2smxV2ca.csHigh entropy of concatenated method names: 'CanConvertFrom', 'ConvertFrom', 'ConvertTo', 'vaAFSwWYCm', 'EwlFaAm5An', 'e0bFLTmkT8', 'wy7FRb6Yag', 'KiFFXT3Zof', 'zPGFwA3wPY', 'MuMFgiq9mT'
              Source: C:\Users\user\Desktop\product sample requirement.exeFile created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeJump to dropped file

              Boot Survival

              barindex
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp"

              Hooking and other Techniques for Hiding and Protection

              barindex
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess information set: NOOPENFILEERRORBOX

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: product sample requirement.exe PID: 6576, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: TWmzcmqkuotC.exe PID: 7340, type: MEMORYSTR
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 2710000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 4710000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 8830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 9830000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 9A30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: AA30000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 2ED0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 3140000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: EB0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 4980000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 8520000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 9520000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 9710000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: A710000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 28C0000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 2B20000 memory reserve | memory write watch
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory allocated: 28C0000 memory reserve | memory write watch
              Source: C:\Users\user\Desktop\product sample requirement.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeThread delayed: delay time: 922337203685477
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6176Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1139Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7906Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1340Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeWindow / User API: threadDelayed 1863Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeWindow / User API: threadDelayed 7984Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exe TID: 6528Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7288Thread sleep time: -1844674407370954s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7212Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7220Thread sleep count: 7906 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7200Thread sleep count: 1340 > 30Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7296Thread sleep time: -2767011611056431s >= -30000sJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7252Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exe TID: 7636Thread sleep count: 38 > 30Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exe TID: 7636Thread sleep time: -35048813740048126s >= -30000sJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exe TID: 7648Thread sleep count: 1863 > 30Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exe TID: 7648Thread sleep count: 7984 > 30Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe TID: 7364Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe TID: 7620Thread sleep time: -922337203685477s >= -30000s
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeFile Volume queried: C:\ FullSizeInformation
              Source: C:\Users\user\Desktop\product sample requirement.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeThread delayed: delay time: 922337203685477
              Source: product sample requirement.exe, 00000008.00000002.4126443765.0000000001136000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln=0
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeMemory written: C:\Users\user\Desktop\product sample requirement.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeMemory written: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe base: 400000 value starts with: 4D5AJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeProcess created: C:\Users\user\Desktop\product sample requirement.exe "C:\Users\user\Desktop\product sample requirement.exe"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Windows\SysWOW64\schtasks.exe "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp"Jump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeProcess created: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"Jump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Users\user\Desktop\product sample requirement.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\OFFSYM.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\OFFSYMSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Users\user\Desktop\product sample requirement.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\product sample requirement.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe VolumeInformation
              Source: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformation
              Source: C:\Users\user\Desktop\product sample requirement.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: product sample requirement.exe, 00000008.00000002.4126443765.000000000118E000.00000004.00000020.00020000.00000000.sdmp, product sample requirement.exe, 00000008.00000002.4126443765.0000000001136000.00000004.00000020.00020000.00000000.sdmp, product sample requirement.exe, 00000008.00000002.4126443765.00000000011EF000.00000004.00000020.00020000.00000000.sdmp, product sample requirement.exe, 00000008.00000002.4126443765.00000000011D3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: C:\Users\user\Desktop\product sample requirement.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27e0bd4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a48528.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a50808.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27d88f4.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.TWmzcmqkuotC.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.276fe74.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: product sample requirement.exe PID: 6576, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: TWmzcmqkuotC.exe PID: 7340, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: TWmzcmqkuotC.exe PID: 7592, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27e0bd4.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a48528.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a50808.2.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27d88f4.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 13.2.TWmzcmqkuotC.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a48528.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27d88f4.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 9.2.TWmzcmqkuotC.exe.2a50808.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.27e0bd4.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.product sample requirement.exe.276fe74.2.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: product sample requirement.exe PID: 6576, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: TWmzcmqkuotC.exe PID: 7340, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: TWmzcmqkuotC.exe PID: 7592, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              1
              Scheduled Task/Job
              111
              Process Injection
              1
              Masquerading
              OS Credential Dumping221
              Security Software Discovery
              Remote Services11
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Scheduled Task/Job
              1
              DLL Side-Loading
              1
              Scheduled Task/Job
              11
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              131
              Virtualization/Sandbox Evasion
              Security Account Manager131
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook111
              Process Injection
              NTDS1
              Application Window Discovery
              Distributed Component Object ModelInput Capture11
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA Secrets1
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts3
              Obfuscated Files or Information
              Cached Domain Credentials13
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items22
              Software Packing
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
              DLL Side-Loading
              Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1560738 Sample: product sample requirement.exe Startdate: 22/11/2024 Architecture: WINDOWS Score: 100 46 teebro1800.dynamic-dns.net 2->46 50 Suricata IDS alerts for network traffic 2->50 52 Found malware configuration 2->52 54 Malicious sample detected (through community Yara rule) 2->54 56 16 other signatures 2->56 8 product sample requirement.exe 7 2->8         started        12 TWmzcmqkuotC.exe 5 2->12         started        signatures3 process4 file5 38 C:\Users\user\AppData\...\TWmzcmqkuotC.exe, PE32 8->38 dropped 40 C:\Users\...\TWmzcmqkuotC.exe:Zone.Identifier, ASCII 8->40 dropped 42 C:\Users\user\AppData\Local\Temp\tmpA26.tmp, XML 8->42 dropped 44 C:\...\product sample requirement.exe.log, ASCII 8->44 dropped 58 Adds a directory exclusion to Windows Defender 8->58 60 Injects a PE file into a foreign processes 8->60 14 powershell.exe 23 8->14         started        17 powershell.exe 23 8->17         started        19 product sample requirement.exe 2 8->19         started        22 schtasks.exe 1 8->22         started        62 Multi AV Scanner detection for dropped file 12->62 64 Machine Learning detection for dropped file 12->64 24 schtasks.exe 12->24         started        26 TWmzcmqkuotC.exe 12->26         started        signatures6 process7 dnsIp8 66 Loading BitLocker PowerShell Module 14->66 28 conhost.exe 14->28         started        30 WmiPrvSE.exe 14->30         started        32 conhost.exe 17->32         started        48 teebro1800.dynamic-dns.net 109.248.151.221, 2195, 49734, 49736 DATACLUBLV Russian Federation 19->48 34 conhost.exe 22->34         started        36 conhost.exe 24->36         started        signatures9 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              product sample requirement.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
              product sample requirement.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe66%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              teebro1800.dynamic-dns.net100%Avira URL Cloudmalware
              NameIPActiveMaliciousAntivirus DetectionReputation
              teebro1800.dynamic-dns.net
              109.248.151.221
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                teebro1800.dynamic-dns.nettrue
                • Avira URL Cloud: malware
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://www.apache.org/licenses/LICENSE-2.0product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.comproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    http://www.fontbureau.com/designersGproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.com/designers/?product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.founder.com.cn/cn/bTheproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers?product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.tiro.comproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.goodfont.co.krproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resourcesproduct sample requirement.exe, TWmzcmqkuotC.exe.0.drfalse
                                    high
                                    http://go.micproduct sample requirement.exe, 00000008.00000002.4126443765.0000000001136000.00000004.00000020.00020000.00000000.sdmpfalse
                                      high
                                      http://www.carterandcone.comlproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.sajatypeworks.comproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.typography.netDproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designers/cabarga.htmlNproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.founder.com.cn/cn/cTheproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.galapagosdesign.com/staff/dennis.htmproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.founder.com.cn/cnproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.fontbureau.com/designers/frere-user.htmlproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.jiyu-kobo.co.jp/product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.galapagosdesign.com/DPleaseproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.fontbureau.com/designers8product sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.fonts.comproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.sandoll.co.krproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://www.urwpp.deDPleaseproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://www.zhongyicts.com.cnproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameproduct sample requirement.exe, 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, product sample requirement.exe, 00000008.00000002.4127948271.0000000003141000.00000004.00000800.00020000.00000000.sdmp, TWmzcmqkuotC.exe, 00000009.00000002.1766752393.0000000002981000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.sakkal.comproduct sample requirement.exe, 00000000.00000002.1729601394.0000000006922000.00000004.00000800.00020000.00000000.sdmp, product sample requirement.exe, 00000000.00000002.1729533775.0000000005130000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                        high
                                                                        • No. of IPs < 25%
                                                                        • 25% < No. of IPs < 50%
                                                                        • 50% < No. of IPs < 75%
                                                                        • 75% < No. of IPs
                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                        109.248.151.221
                                                                        teebro1800.dynamic-dns.netRussian Federation
                                                                        52048DATACLUBLVtrue
                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                        Analysis ID:1560738
                                                                        Start date and time:2024-11-22 09:14:44 +01:00
                                                                        Joe Sandbox product:CloudBasic
                                                                        Overall analysis duration:0h 9m 2s
                                                                        Hypervisor based Inspection enabled:false
                                                                        Report type:full
                                                                        Cookbook file name:default.jbs
                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                        Number of analysed new started processes analysed:18
                                                                        Number of new started drivers analysed:0
                                                                        Number of existing processes analysed:0
                                                                        Number of existing drivers analysed:0
                                                                        Number of injected processes analysed:0
                                                                        Technologies:
                                                                        • HCA enabled
                                                                        • EGA enabled
                                                                        • AMSI enabled
                                                                        Analysis Mode:default
                                                                        Analysis stop reason:Timeout
                                                                        Sample name:product sample requirement.exe
                                                                        Detection:MAL
                                                                        Classification:mal100.troj.evad.winEXE@19/15@8/1
                                                                        EGA Information:
                                                                        • Successful, ratio: 50%
                                                                        HCA Information:
                                                                        • Successful, ratio: 98%
                                                                        • Number of executed functions: 227
                                                                        • Number of non-executed functions: 12
                                                                        Cookbook Comments:
                                                                        • Found application associated with file extension: .exe
                                                                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                        • Execution Graph export aborted for target TWmzcmqkuotC.exe, PID 7592 because it is empty
                                                                        • Execution Graph export aborted for target product sample requirement.exe, PID 7236 because it is empty
                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                        • Report size exceeded maximum capacity and may have missing behavior information.
                                                                        • Report size getting too big, too many NtCreateKey calls found.
                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                        • VT rate limit hit for: product sample requirement.exe
                                                                        TimeTypeDescription
                                                                        03:15:37API Interceptor8521548x Sleep call for process: product sample requirement.exe modified
                                                                        03:15:39API Interceptor35x Sleep call for process: powershell.exe modified
                                                                        03:15:41API Interceptor2x Sleep call for process: TWmzcmqkuotC.exe modified
                                                                        08:15:41Task SchedulerRun new task: TWmzcmqkuotC path: C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        No context
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        teebro1800.dynamic-dns.netz1ProductSampleRequirement.exeGet hashmaliciousRemcosBrowse
                                                                        • 51.75.166.98
                                                                        HSBC Payment Swift Copy.exeGet hashmaliciousRemcosBrowse
                                                                        • 140.228.29.6
                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                        DATACLUBLVCOTIZACIONSyCONSULTA#46789NOV24.bat.exeGet hashmaliciousRemcos, GuLoaderBrowse
                                                                        • 46.183.220.125
                                                                        Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 109.248.151.196
                                                                        Finvasken.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 109.248.151.196
                                                                        USD Payment Receipt 12112024.exeGet hashmaliciousNoCry, XWormBrowse
                                                                        • 109.248.151.21
                                                                        86#U041b.exeGet hashmaliciousXWormBrowse
                                                                        • 84.38.130.134
                                                                        46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 109.248.150.169
                                                                        46roqD3HEE.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 109.248.150.169
                                                                        iENcsTur6E.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                        • 109.248.150.169
                                                                        6ehOuQ8ifL.exeGet hashmaliciousAgentTeslaBrowse
                                                                        • 109.248.150.169
                                                                        Noncapture19.exeGet hashmaliciousFormBook, GuLoaderBrowse
                                                                        • 109.248.151.196
                                                                        No context
                                                                        No context
                                                                        Process:C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1216
                                                                        Entropy (8bit):5.34331486778365
                                                                        Encrypted:false
                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                        Malicious:false
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                        Process:C:\Users\user\Desktop\product sample requirement.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):1216
                                                                        Entropy (8bit):5.34331486778365
                                                                        Encrypted:false
                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4x84j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0HJ
                                                                        MD5:1330C80CAAC9A0FB172F202485E9B1E8
                                                                        SHA1:86BAFDA4E4AE68C7C3012714A33D85D2B6E1A492
                                                                        SHA-256:B6C63ECE799A8F7E497C2A158B1FFC2F5CB4F745A2F8E585F794572B7CF03560
                                                                        SHA-512:75A17AB129FE97BBAB36AA2BD66D59F41DB5AFF44A705EF3E4D094EC5FCD056A3ED59992A0AC96C9D0D40E490F8596B07DCA9B60E606B67223867B061D9D0EB2
                                                                        Malicious:true
                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:data
                                                                        Category:dropped
                                                                        Size (bytes):2232
                                                                        Entropy (8bit):5.3810236212315665
                                                                        Encrypted:false
                                                                        SSDEEP:48:lylWSU4xympgv4RIoUP7gZ9tK8NPZHUx7u1iMuge//ZeUyus:lGLHxv2IfLZ2KRH6Ougos
                                                                        MD5:534D6716758747FA57A53A245EB4D6A1
                                                                        SHA1:78784FF1B73FBA507598C5D518BE90D9B96EE1B6
                                                                        SHA-256:2BC11EC63A7511C3C755BA497E774B153A2C8366E779B00369714A49EE4E492B
                                                                        SHA-512:D957D8DD62F4694C3FF7CE48384356F756370B082B488529AB510C35DB5C06C159EACA9ABEADFC715E13BAB7C5EDF2DD9D7134BDBF6DCF1D2B3F4451E1454475
                                                                        Malicious:false
                                                                        Preview:@...e.................................^..............@..........P................1]...E.....j.....(.Microsoft.PowerShell.Commands.ManagementH...............o..b~.D.poM......... .Microsoft.PowerShell.ConsoleHost0......................C.l]..7.s........System..4....................D...{..|f........System.Core.D...............4..7..D.#V.............System.Management.Automation<...............i..VdqF...|...........System.Configuration4.................%...K... ...........System.Xml..4.....................@.[8]'.\........System.Data.<................t.,.lG....M...........System.Management...@................z.U..G...5.f.1........System.DirectoryServicesL.................*gQ?O.....x5.......#.Microsoft.Management.Infrastructure.8..................1...L..U;V.<}........System.Numerics.H................WY..2.M.&..g*(g........Microsoft.PowerShell.Security...<...............V.}...@...i...........System.Transactions.P...............8..{...@.e..."4.......%.Microsoft.PowerShell.Com
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        File Type:ASCII text, with no line terminators
                                                                        Category:dropped
                                                                        Size (bytes):60
                                                                        Entropy (8bit):4.038920595031593
                                                                        Encrypted:false
                                                                        SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                        MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                        SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                        SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                        SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                        Malicious:false
                                                                        Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                        Process:C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        File Type:XML 1.0 document, ASCII text
                                                                        Category:dropped
                                                                        Size (bytes):1578
                                                                        Entropy (8bit):5.116333157337675
                                                                        Encrypted:false
                                                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaBIxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT/v
                                                                        MD5:64F99015749EC0B20ACF03168E78014A
                                                                        SHA1:774A9C55A40906DA0070A62092842A4AE53A9081
                                                                        SHA-256:1D236F557DB2338C7BD73AA87F8D06EE04FC55C3B5E3079E81DA7256A60E0B49
                                                                        SHA-512:8E6F5EF54B24F6C57201F5FA2CC0729C265CA87E8DE18EDD03CFCA2E9EB47FA87503056F0E9FF608279744A1E8AFFDAB2D9554D1CEA2F02550DB863F57BC66DF
                                                                        Malicious:false
                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                        Process:C:\Users\user\Desktop\product sample requirement.exe
                                                                        File Type:XML 1.0 document, ASCII text
                                                                        Category:dropped
                                                                        Size (bytes):1578
                                                                        Entropy (8bit):5.116333157337675
                                                                        Encrypted:false
                                                                        SSDEEP:24:2di4+S2qh11hXy1mvWUnrKMhEMOFGpwOzNgU3ODOiIQRvh7hwrgXuNtaBIxvn:cge1wYrFdOFzOzN33ODOiDdKrsuT/v
                                                                        MD5:64F99015749EC0B20ACF03168E78014A
                                                                        SHA1:774A9C55A40906DA0070A62092842A4AE53A9081
                                                                        SHA-256:1D236F557DB2338C7BD73AA87F8D06EE04FC55C3B5E3079E81DA7256A60E0B49
                                                                        SHA-512:8E6F5EF54B24F6C57201F5FA2CC0729C265CA87E8DE18EDD03CFCA2E9EB47FA87503056F0E9FF608279744A1E8AFFDAB2D9554D1CEA2F02550DB863F57BC66DF
                                                                        Malicious:true
                                                                        Preview:<?xml version="1.0" encoding="UTF-16"?>.<Task version="1.2" xmlns="http://schemas.microsoft.com/windows/2004/02/mit/task">. <RegistrationInfo>. <Date>2014-10-25T14:27:44.8929027</Date>. <Author>user-PC\user</Author>. </RegistrationInfo>. <Triggers>. <LogonTrigger>. <Enabled>true</Enabled>. <UserId>user-PC\user</UserId>. </LogonTrigger>. <RegistrationTrigger>. <Enabled>false</Enabled>. </RegistrationTrigger>. </Triggers>. <Principals>. <Principal id="Author">. <UserId>user-PC\user</UserId>. <LogonType>InteractiveToken</LogonType>. <RunLevel>LeastPrivilege</RunLevel>. </Principal>. </Principals>. <Settings>. <MultipleInstancesPolicy>StopExisting</MultipleInstancesPolicy>. <DisallowStartIfOnBatteries>false</DisallowStartIfOnBatteries>. <StopIfGoingOnBatteries>true</StopIfGoingOnBatteries>. <AllowHardTerminate>false</AllowHardTerminate>. <StartWhenAvailable>true</StartWhenAvailable>. <RunOnlyIfNetworkAvail
                                                                        Process:C:\Users\user\Desktop\product sample requirement.exe
                                                                        File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Category:dropped
                                                                        Size (bytes):448512
                                                                        Entropy (8bit):7.899851657059944
                                                                        Encrypted:false
                                                                        SSDEEP:12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr
                                                                        MD5:07D5A83558349A82CFA1DC6D68F4D84B
                                                                        SHA1:064AF18045030703BC4C62C99F1ABE5700832E8A
                                                                        SHA-256:096B33571E80D18C1763A3BD5D019E3177F1547B3CA6E6205A349075CE2FEC18
                                                                        SHA-512:AA9D794E0FFB14163F3D1C2DF374B99DA287B7CE1DF965E271921A700A9972C6EAD3830F0319EB9EC2D1352E2C0A06BB192045E482B2D54FE091C29DC58946BF
                                                                        Malicious:true
                                                                        Antivirus:
                                                                        • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                        • Antivirus: ReversingLabs, Detection: 66%
                                                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-<g..............0.............*.... ........@.. .......................@............@.....................................O.......L.................... ..........T............................................ ............... ..H............text...0.... ...................... ..`.rsrc...L...........................@..@.reloc....... ......................@..B........................H........}...O......i....................................................0..$..........s......s.....s ......o!...&..+..*.0..)........s\....s.......o[...s......o".......+...*....0..+........s\....r...p.(#......o[...s......o$....+..*..0..0........s\....rC..p.r...p(%......o[...s......o$....+..*.0...........s\.......O...%.r...p.%...%.r...p.%...%.r...p.%....%.r!..p.%....%.r;..p.%.....%..rU..p.%.....%..ry..p.%....%..r...p.(&......o[...s.......o$...&r...p('...&......o(...('...&...*.
                                                                        Process:C:\Users\user\Desktop\product sample requirement.exe
                                                                        File Type:ASCII text, with CRLF line terminators
                                                                        Category:dropped
                                                                        Size (bytes):26
                                                                        Entropy (8bit):3.95006375643621
                                                                        Encrypted:false
                                                                        SSDEEP:3:ggPYV:rPYV
                                                                        MD5:187F488E27DB4AF347237FE461A079AD
                                                                        SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                                        SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                                        SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                                        Malicious:true
                                                                        Preview:[ZoneTransfer]....ZoneId=0
                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                        Entropy (8bit):7.899851657059944
                                                                        TrID:
                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                                        • Win32 Executable (generic) a (10002005/4) 49.75%
                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                        • Windows Screen Saver (13104/52) 0.07%
                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                        File name:product sample requirement.exe
                                                                        File size:448'512 bytes
                                                                        MD5:07d5a83558349a82cfa1dc6d68f4d84b
                                                                        SHA1:064af18045030703bc4c62c99f1abe5700832e8a
                                                                        SHA256:096b33571e80d18c1763a3bd5d019e3177f1547b3ca6e6205a349075ce2fec18
                                                                        SHA512:aa9d794e0ffb14163f3d1c2df374b99da287b7ce1df965e271921a700a9972c6ead3830f0319eb9ec2d1352e2c0a06bb192045e482b2d54fe091c29dc58946bf
                                                                        SSDEEP:12288:pMFo7mq6/FqLzEvttwVnGUaGtyk6JXFajEHUC:pko7mq+I/EOoEIr
                                                                        TLSH:AD94018132AD9FABD57A5BF16222645117F5283B6A32F21C1FD240DF2D7AF006761B0B
                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....-<g..............0.............*.... ........@.. .......................@............@................................
                                                                        Icon Hash:90cececece8e8eb0
                                                                        Entrypoint:0x46eb2a
                                                                        Entrypoint Section:.text
                                                                        Digitally signed:false
                                                                        Imagebase:0x400000
                                                                        Subsystem:windows gui
                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                        Time Stamp:0x673C2D0F [Tue Nov 19 06:15:43 2024 UTC]
                                                                        TLS Callbacks:
                                                                        CLR (.Net) Version:
                                                                        OS Version Major:4
                                                                        OS Version Minor:0
                                                                        File Version Major:4
                                                                        File Version Minor:0
                                                                        Subsystem Version Major:4
                                                                        Subsystem Version Minor:0
                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                        Instruction
                                                                        jmp dword ptr [00402000h]
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        add byte ptr [eax], al
                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x6ead60x4f.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000x64c.rsrc
                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x720000xc.reloc
                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x6c9d80x54.text
                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                        .text0x20000x6cb300x6cc00de7fadb31d125c006b04b7d8ac37576fFalse0.9335623204022988data7.914229382691976IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                        .rsrc0x700000x64c0x800ccde5771d2be2cbd7ab9cb27545fa3f8False0.341796875data3.514751469590367IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                        .reloc0x720000xc0x2006cbf4c2f3aa890a0dbbce9eb4b9fa19aFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                        RT_VERSION0x700900x3bcdata0.4131799163179916
                                                                        RT_MANIFEST0x7045c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                        DLLImport
                                                                        mscoree.dll_CorExeMain
                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                        2024-11-22T09:17:07.824645+01002855924ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.449835109.248.151.2212195TCP
                                                                        2024-11-22T09:18:32.444655+01002853193ETPRO MALWARE Win32/XWorm V3 CnC Command - PING Outbound1192.168.2.450032109.248.151.2212195TCP
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 22, 2024 09:15:44.022052050 CET497342195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:44.141654968 CET219549734109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:44.141756058 CET497342195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:44.761178970 CET497342195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:44.880902052 CET219549734109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:45.528965950 CET219549734109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:45.529046059 CET497342195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:49.527546883 CET497342195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:49.530030966 CET497362195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:49.647260904 CET219549734109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:49.649630070 CET219549736109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:49.649843931 CET497362195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:49.858047009 CET497362195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:49.977694988 CET219549736109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:51.046667099 CET219549736109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:51.049058914 CET497362195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:53.464950085 CET497362195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:53.466892004 CET497382195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:53.584748030 CET219549736109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:53.586877108 CET219549738109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:53.586952925 CET497382195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:53.607582092 CET497382195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:53.727271080 CET219549738109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:54.934092999 CET219549738109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:54.934185028 CET497382195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:57.871717930 CET497382195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:57.872847080 CET497422195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:57.991333961 CET219549738109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:57.992377996 CET219549742109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:57.992521048 CET497422195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:58.038222075 CET497422195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:15:58.158031940 CET219549742109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:59.343750000 CET219549742109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:15:59.343822002 CET497422195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:02.449476004 CET497422195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:02.450926065 CET497452195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:02.569233894 CET219549742109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:02.570508957 CET219549745109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:02.570728064 CET497452195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:02.589823961 CET497452195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:02.709434986 CET219549745109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:03.875591040 CET219549745109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:03.875710964 CET497452195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:07.147692919 CET497452195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:07.148540974 CET497462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:07.267632008 CET219549745109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:07.268232107 CET219549746109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:07.268423080 CET497462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:07.485743046 CET497462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:07.605431080 CET219549746109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:08.660748959 CET219549746109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:08.660830021 CET497462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:11.293171883 CET497462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:11.294313908 CET497472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:11.412879944 CET219549746109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:11.413945913 CET219549747109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:11.414057016 CET497472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:11.433475971 CET497472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:11.553092003 CET219549747109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:12.763955116 CET219549747109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:12.764040947 CET497472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:15.871279955 CET497472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:15.990838051 CET219549747109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:16.189205885 CET497482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:16.308779955 CET219549748109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:16.308934927 CET497482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:16.329668999 CET497482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:16.451023102 CET219549748109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:17.612530947 CET219549748109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:17.613517046 CET497482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:20.590267897 CET497482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:20.591284990 CET497492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:20.710216999 CET219549748109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:20.710931063 CET219549749109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:20.711157084 CET497492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:20.727669954 CET497492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:20.847393036 CET219549749109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:22.060903072 CET219549749109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:22.061024904 CET497492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:25.730804920 CET497492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:25.733030081 CET497502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:25.850733042 CET219549749109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:25.852746964 CET219549750109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:25.852843046 CET497502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:25.871373892 CET497502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:25.991218090 CET219549750109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:27.202214956 CET219549750109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:27.202306986 CET497502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:29.871376038 CET497502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:29.872512102 CET497512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:29.991084099 CET219549750109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:29.992115974 CET219549751109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:29.992218971 CET497512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:30.010442019 CET497512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:30.130084991 CET219549751109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:31.344849110 CET219549751109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:31.345088005 CET497512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:33.699418068 CET497512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:33.701277018 CET497522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:33.819268942 CET219549751109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:33.821183920 CET219549752109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:33.821288109 CET497522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:33.841543913 CET497522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:33.961118937 CET219549752109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:35.156100988 CET219549752109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:35.157075882 CET497522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:36.933820963 CET497522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:36.934931993 CET497552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:37.061971903 CET219549752109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:37.061986923 CET219549755109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:37.062103033 CET497552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:37.077900887 CET497552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:37.197475910 CET219549755109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:38.841099024 CET219549755109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:38.841577053 CET497552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:38.996411085 CET497552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:38.997776985 CET497612195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:39.116080999 CET219549755109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:39.117285013 CET219549761109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:39.117409945 CET497612195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:39.146034956 CET497612195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:39.265779018 CET219549761109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:40.467009068 CET219549761109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:40.471435070 CET497612195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:41.449717999 CET497612195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:41.452358007 CET497672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:41.569302082 CET219549761109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:41.571851015 CET219549767109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:41.571963072 CET497672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:41.589179993 CET497672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:41.708695889 CET219549767109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:42.924520969 CET219549767109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:42.927454948 CET497672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:43.684034109 CET497672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:43.685415983 CET497732195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:43.803546906 CET219549767109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:43.805008888 CET219549773109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:43.805129051 CET497732195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:43.822591066 CET497732195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:43.942194939 CET219549773109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:45.202876091 CET219549773109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:45.202971935 CET497732195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:45.261915922 CET497732195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:45.264307022 CET497792195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:45.381469011 CET219549773109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:45.383835077 CET219549779109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:45.383932114 CET497792195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:45.405711889 CET497792195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:45.525363922 CET219549779109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:46.830090046 CET219549779109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:46.831384897 CET497792195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:47.105767012 CET497792195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:47.225399017 CET219549779109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:47.424114943 CET497852195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:47.543818951 CET219549785109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:47.543932915 CET497852195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:47.562681913 CET497852195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:47.682248116 CET219549785109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:48.892183065 CET219549785109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:48.896245003 CET497852195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:49.293268919 CET497852195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:49.295298100 CET497912195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:49.412864923 CET219549785109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:49.414874077 CET219549791109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:49.414947987 CET497912195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:49.458704948 CET497912195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:49.578233957 CET219549791109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:50.718190908 CET219549791109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:50.718305111 CET497912195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:51.121918917 CET497912195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:51.141486883 CET497952195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:51.241497993 CET219549791109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:51.261030912 CET219549795109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:51.261249065 CET497952195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:51.279598951 CET497952195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:51.399079084 CET219549795109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:52.611619949 CET219549795109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:52.612051010 CET497952195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:52.652652025 CET497952195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:52.655872107 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:52.772080898 CET219549795109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:52.775517941 CET219549798109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:52.775696993 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:52.793006897 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:52.912575006 CET219549798109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:53.920808077 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.040302038 CET219549798109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:54.080425024 CET219549798109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:54.080604076 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.106349945 CET497982195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.107388973 CET498042195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.225924015 CET219549798109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:54.226840973 CET219549804109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:54.227046013 CET498042195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.409071922 CET498042195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:54.528587103 CET219549804109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:55.537517071 CET219549804109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:55.537599087 CET498042195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:55.543416023 CET498042195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:55.546050072 CET498052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:55.663011074 CET219549804109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:55.665790081 CET219549805109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:55.665868998 CET498052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:55.711365938 CET498052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:16:55.830936909 CET219549805109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:57.016364098 CET219549805109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:16:57.016437054 CET498052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.152672052 CET498052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.156955004 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.272341013 CET219549805109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:01.276680946 CET219549821109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:01.276781082 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.321078062 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.440907001 CET219549821109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:01.440968037 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:01.560574055 CET219549821109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:02.581870079 CET219549821109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:02.581949949 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.543340921 CET498212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.545228958 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.662830114 CET219549821109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:07.664808989 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:07.664879084 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.705071926 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.824592113 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:07.824645042 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:07.944168091 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:07.945422888 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:08.064924002 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:09.111574888 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:09.111649990 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:13.059004068 CET498352195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:13.062181950 CET498472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:13.178639889 CET219549835109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:13.181742907 CET219549847109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:13.181822062 CET498472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:13.210834026 CET498472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:13.330384970 CET219549847109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:14.578416109 CET219549847109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:14.578668118 CET498472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:18.373127937 CET498472195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:18.493662119 CET219549847109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:18.675962925 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:18.795553923 CET219549859109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:18.795734882 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:18.857994080 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:18.977519035 CET219549859109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:19.043698072 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:19.163161993 CET219549859109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:20.192817926 CET219549859109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:20.192923069 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:24.061059952 CET498592195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:24.061290979 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:24.180583954 CET219549859109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:24.180794954 CET219549874109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:24.180927038 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:24.249042034 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:24.368683100 CET219549874109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:25.075208902 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:25.194833040 CET219549874109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:25.531023979 CET219549874109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:25.531100988 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.308948040 CET498742195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.310348034 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.428425074 CET219549874109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:29.429868937 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:29.429939032 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.467187881 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.586725950 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:29.586782932 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.706378937 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:29.706465960 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:29.826014996 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:30.074846983 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:30.194346905 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:30.857764959 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:30.860877037 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.090295076 CET498862195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.091989994 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.210679054 CET219549886109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:35.212374926 CET219549901109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:35.212479115 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.251195908 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.371129036 CET219549901109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:35.434179068 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:35.553720951 CET219549901109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:36.610152960 CET219549901109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:36.610236883 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:40.449719906 CET499012195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:40.453319073 CET499132195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:40.570322990 CET219549901109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:40.573648930 CET219549913109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:40.573868990 CET499132195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:40.679364920 CET499132195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:40.798986912 CET219549913109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:42.040077925 CET219549913109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:42.040231943 CET499132195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:46.451353073 CET499132195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:46.452172995 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:46.570898056 CET219549913109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:46.571743965 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:46.571939945 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:46.715351105 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:46.834933043 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:47.090765953 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:47.210254908 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:47.968997002 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:47.969118118 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:48.508429050 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:48.508501053 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:52.152774096 CET499272195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:52.272329092 CET219549927109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:52.470354080 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:52.590781927 CET219549940109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:52.591088057 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:52.699244976 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:52.819252968 CET219549940109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:53.325701952 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:53.445173979 CET219549940109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:53.898468018 CET219549940109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:53.898545980 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:58.340671062 CET499402195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:58.343511105 CET499552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:58.460155964 CET219549940109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:58.462970018 CET219549955109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:58.463148117 CET499552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:58.673439026 CET499552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:17:58.792877913 CET219549955109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:59.813416958 CET219549955109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:17:59.813509941 CET499552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:03.762109995 CET499552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:03.764133930 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:04.039621115 CET219549955109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:04.039663076 CET219549967109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:04.044729948 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:04.217196941 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:04.336832047 CET219549967109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:04.337260962 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:04.456873894 CET219549967109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:05.440903902 CET219549967109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:05.440972090 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:09.294042110 CET499672195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:09.297210932 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:09.413470984 CET219549967109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:09.416662931 CET219549978109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:09.417191982 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:09.703227043 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:09.823966980 CET219549978109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:10.074826956 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:10.194314957 CET219549978109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:10.809998035 CET219549978109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:10.810080051 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:15.155011892 CET499932195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:15.155014038 CET499782195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:15.274580002 CET219549978109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:15.274633884 CET219549993109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:15.275237083 CET499932195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:15.334928989 CET499932195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:15.454433918 CET219549993109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:16.625097990 CET219549993109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:16.625173092 CET499932195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:20.887228966 CET499932195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:20.889097929 CET500052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:21.006726027 CET219549993109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:21.008558989 CET219550005109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:21.008635998 CET500052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:21.055896044 CET500052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:21.176043034 CET219550005109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:22.406898022 CET219550005109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:22.406989098 CET500052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:26.419723034 CET500052195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:26.539174080 CET219550005109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:26.733974934 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:26.853530884 CET219550021109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:26.853681087 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:26.881724119 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:27.001198053 CET219550021109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:27.001280069 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:27.120812893 CET219550021109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:28.203653097 CET219550021109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:28.203716993 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.044029951 CET500212195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.048511028 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.163639069 CET219550021109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:32.167927980 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:32.168018103 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.205600977 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.325073957 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:32.325129032 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.444597960 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:32.444654942 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.564152002 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:32.564203978 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:32.683634043 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:33.554050922 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:33.554192066 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:37.593143940 CET500462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:37.593143940 CET500322195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:37.712856054 CET219550032109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:37.712892056 CET219550046109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:37.713078022 CET500462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:37.805833101 CET500462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:37.925368071 CET219550046109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:39.155766010 CET219550046109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:39.158405066 CET500462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:42.981081963 CET500462195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:42.983942986 CET500482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:43.101711035 CET219550046109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:43.103727102 CET219550048109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:43.110830069 CET500482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:43.209877968 CET500482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:43.329356909 CET219550048109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:44.520554066 CET219550048109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:44.520641088 CET500482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:48.299293995 CET500482195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:48.303780079 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:48.419009924 CET219550048109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:48.423397064 CET219550049109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:48.423482895 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:48.864780903 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:48.984309912 CET219550049109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:48.984369993 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:49.105076075 CET219550049109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:49.821583033 CET219550049109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:49.821672916 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:53.999382019 CET500492195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:54.019352913 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:54.118962049 CET219550049109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:54.138919115 CET219550050109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:54.138997078 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:54.332732916 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:54.452950954 CET219550050109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:54.481452942 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:54.600919008 CET219550050109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:55.503173113 CET219550050109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:55.505368948 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:59.591352940 CET500502195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:18:59.710803986 CET219550050109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:18:59.903352976 CET500512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:00.024008989 CET219550051109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:00.024251938 CET500512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:00.108057976 CET500512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:00.227464914 CET219550051109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:01.327795029 CET219550051109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:01.328150988 CET500512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:05.137258053 CET500512195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:05.138938904 CET500522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:05.256886005 CET219550051109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:05.258414984 CET219550052109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:05.258519888 CET500522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:05.324457884 CET500522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:05.445517063 CET219550052109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:06.608045101 CET219550052109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:06.610094070 CET500522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:10.344913960 CET500522195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:10.349524021 CET500532195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:10.467278004 CET219550052109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:10.471395969 CET219550053109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:10.471510887 CET500532195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:10.498419046 CET500532195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:10.617897034 CET219550053109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:11.774960041 CET219550053109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:11.775058985 CET500532195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:15.543790102 CET500532195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:15.547010899 CET500542195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:15.663295984 CET219550053109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:15.666495085 CET219550054109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:15.666660070 CET500542195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:15.775243998 CET500542195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:15.894781113 CET219550054109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:17.147377014 CET219550054109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:17.147449017 CET500542195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.043576002 CET500542195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.046864033 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.162997961 CET219550054109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:21.167071104 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:21.167198896 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.394447088 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.514641047 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:21.684566975 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:21.804539919 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:21.996984005 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:22.117243052 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:22.469850063 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:22.469932079 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:27.059252024 CET500552195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:27.062689066 CET500562195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:27.178706884 CET219550055109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:27.182249069 CET219550056109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:27.188883066 CET500562195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:27.365329981 CET500562195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:27.486409903 CET219550056109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:28.584558010 CET219550056109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:28.584631920 CET500562195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:32.512366056 CET500562195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:32.631815910 CET219550056109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:32.832989931 CET500572195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:32.952472925 CET219550057109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:32.952569008 CET500572195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:32.988400936 CET500572195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:33.107973099 CET219550057109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:34.302850008 CET219550057109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:34.302901030 CET500572195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.044800043 CET500572195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.046646118 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.164489031 CET219550057109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.166166067 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.166281939 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.222270966 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.341814041 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.341878891 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.461364985 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.461412907 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.580791950 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.580878019 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.700433969 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.840866089 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:38.960305929 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:38.960352898 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:39.079804897 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:39.079862118 CET500582195192.168.2.4109.248.151.221
                                                                        Nov 22, 2024 09:19:39.199280024 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:39.475450039 CET219550058109.248.151.221192.168.2.4
                                                                        Nov 22, 2024 09:19:39.483419895 CET500582195192.168.2.4109.248.151.221
                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                        Nov 22, 2024 09:15:43.084871054 CET6043453192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:15:44.014076948 CET53604341.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:16:15.872637033 CET5746753192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:16:16.187975883 CET53574671.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:16:47.107153893 CET5530253192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:16:47.422873020 CET53553021.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:17:18.374810934 CET6193353192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:17:18.675059080 CET53619331.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:17:52.155280113 CET6033953192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:17:52.469444036 CET53603391.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:18:26.423135042 CET5647853192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:18:26.733156919 CET53564781.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:18:59.598335028 CET5601453192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:18:59.898725033 CET53560141.1.1.1192.168.2.4
                                                                        Nov 22, 2024 09:19:32.515826941 CET5462753192.168.2.41.1.1.1
                                                                        Nov 22, 2024 09:19:32.832118988 CET53546271.1.1.1192.168.2.4
                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                        Nov 22, 2024 09:15:43.084871054 CET192.168.2.41.1.1.10x834eStandard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:16:15.872637033 CET192.168.2.41.1.1.10x6152Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:16:47.107153893 CET192.168.2.41.1.1.10xa8acStandard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:17:18.374810934 CET192.168.2.41.1.1.10x6822Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:17:52.155280113 CET192.168.2.41.1.1.10xf095Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:18:26.423135042 CET192.168.2.41.1.1.10x9c96Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:18:59.598335028 CET192.168.2.41.1.1.10x90a4Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:19:32.515826941 CET192.168.2.41.1.1.10x6a41Standard query (0)teebro1800.dynamic-dns.netA (IP address)IN (0x0001)false
                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                        Nov 22, 2024 09:15:44.014076948 CET1.1.1.1192.168.2.40x834eNo error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:16:16.187975883 CET1.1.1.1192.168.2.40x6152No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:16:47.422873020 CET1.1.1.1192.168.2.40xa8acNo error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:17:18.675059080 CET1.1.1.1192.168.2.40x6822No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:17:52.469444036 CET1.1.1.1192.168.2.40xf095No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:18:26.733156919 CET1.1.1.1192.168.2.40x9c96No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:18:59.898725033 CET1.1.1.1192.168.2.40x90a4No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false
                                                                        Nov 22, 2024 09:19:32.832118988 CET1.1.1.1192.168.2.40x6a41No error (0)teebro1800.dynamic-dns.net109.248.151.221A (IP address)IN (0x0001)false

                                                                        Click to jump to process

                                                                        Click to jump to process

                                                                        Click to dive into process behavior distribution

                                                                        Click to jump to process

                                                                        Target ID:0
                                                                        Start time:03:15:36
                                                                        Start date:22/11/2024
                                                                        Path:C:\Users\user\Desktop\product sample requirement.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\product sample requirement.exe"
                                                                        Imagebase:0x3b0000
                                                                        File size:448'512 bytes
                                                                        MD5 hash:07D5A83558349A82CFA1DC6D68F4D84B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.1725821769.0000000002711000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:2
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\product sample requirement.exe"
                                                                        Imagebase:0xfe0000
                                                                        File size:433'152 bytes
                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:3
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:4
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"
                                                                        Imagebase:0xfe0000
                                                                        File size:433'152 bytes
                                                                        MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:5
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:6
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmpA26.tmp"
                                                                        Imagebase:0x150000
                                                                        File size:187'904 bytes
                                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:7
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:8
                                                                        Start time:03:15:38
                                                                        Start date:22/11/2024
                                                                        Path:C:\Users\user\Desktop\product sample requirement.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\Desktop\product sample requirement.exe"
                                                                        Imagebase:0xc40000
                                                                        File size:448'512 bytes
                                                                        MD5 hash:07D5A83558349A82CFA1DC6D68F4D84B
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:true
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:low
                                                                        Has exited:false

                                                                        Target ID:9
                                                                        Start time:03:15:41
                                                                        Start date:22/11/2024
                                                                        Path:C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        Imagebase:0x620000
                                                                        File size:448'512 bytes
                                                                        MD5 hash:07D5A83558349A82CFA1DC6D68F4D84B
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000009.00000002.1766752393.0000000002A46000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Antivirus matches:
                                                                        • Detection: 100%, Joe Sandbox ML
                                                                        • Detection: 66%, ReversingLabs
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Target ID:10
                                                                        Start time:03:15:41
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\System32\wbem\WmiPrvSE.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
                                                                        Imagebase:0x7ff693ab0000
                                                                        File size:496'640 bytes
                                                                        MD5 hash:60FF40CFD7FB8FE41EE4FE9AE5FE1C51
                                                                        Has elevated privileges:true
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:11
                                                                        Start time:03:15:42
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\SysWOW64\schtasks.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TWmzcmqkuotC" /XML "C:\Users\user\AppData\Local\Temp\tmp1AB0.tmp"
                                                                        Imagebase:0x150000
                                                                        File size:187'904 bytes
                                                                        MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:12
                                                                        Start time:03:15:42
                                                                        Start date:22/11/2024
                                                                        Path:C:\Windows\System32\conhost.exe
                                                                        Wow64 process (32bit):false
                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                        Imagebase:0x7ff7699e0000
                                                                        File size:862'208 bytes
                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Reputation:high
                                                                        Has exited:true

                                                                        Target ID:13
                                                                        Start time:03:15:43
                                                                        Start date:22/11/2024
                                                                        Path:C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe
                                                                        Wow64 process (32bit):true
                                                                        Commandline:"C:\Users\user\AppData\Roaming\TWmzcmqkuotC.exe"
                                                                        Imagebase:0x710000
                                                                        File size:448'512 bytes
                                                                        MD5 hash:07D5A83558349A82CFA1DC6D68F4D84B
                                                                        Has elevated privileges:false
                                                                        Has administrator privileges:false
                                                                        Programmed in:C, C++ or other language
                                                                        Yara matches:
                                                                        • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                        • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 0000000D.00000002.1778713308.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                                                        Reputation:low
                                                                        Has exited:true

                                                                        Reset < >

                                                                          Execution Graph

                                                                          Execution Coverage:9.7%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:2.9%
                                                                          Total number of Nodes:175
                                                                          Total number of Limit Nodes:10
                                                                          execution_graph 52223 256d000 52224 256d046 52223->52224 52228 256d5e7 52224->52228 52231 256d5e8 52224->52231 52225 256d133 52234 256d23c 52228->52234 52232 256d616 52231->52232 52233 256d23c DuplicateHandle 52231->52233 52232->52225 52233->52232 52235 256d650 DuplicateHandle 52234->52235 52236 256d616 52235->52236 52236->52225 52237 256ac70 52238 256ac7f 52237->52238 52241 256ad68 52237->52241 52246 256ad58 52237->52246 52242 256ad9c 52241->52242 52243 256ad79 52241->52243 52242->52238 52243->52242 52244 256afa0 GetModuleHandleW 52243->52244 52245 256afcd 52244->52245 52245->52238 52247 256ad79 52246->52247 52248 256ad9c 52246->52248 52247->52248 52249 256afa0 GetModuleHandleW 52247->52249 52248->52238 52250 256afcd 52249->52250 52250->52238 52251 7151a2c 52255 7154110 52251->52255 52272 7154100 52251->52272 52252 7151a47 52256 715412a 52255->52256 52263 7154132 52256->52263 52289 7154d1d 52256->52289 52297 71543e8 52256->52297 52302 7154a08 52256->52302 52306 715496c 52256->52306 52313 715470c 52256->52313 52318 7154eec 52256->52318 52323 7154e02 52256->52323 52328 71547a3 52256->52328 52333 7154520 52256->52333 52338 7154ca7 52256->52338 52343 71548e4 52256->52343 52348 7154684 52256->52348 52355 7154a7c 52256->52355 52360 715461d 52256->52360 52263->52252 52273 7154110 52272->52273 52274 7154132 52273->52274 52275 7154d1d 4 API calls 52273->52275 52276 715461d 2 API calls 52273->52276 52277 7154a7c 2 API calls 52273->52277 52278 7154684 4 API calls 52273->52278 52279 71548e4 2 API calls 52273->52279 52280 7154ca7 2 API calls 52273->52280 52281 7154520 2 API calls 52273->52281 52282 71547a3 2 API calls 52273->52282 52283 7154e02 2 API calls 52273->52283 52284 7154eec 2 API calls 52273->52284 52285 715470c 2 API calls 52273->52285 52286 715496c 4 API calls 52273->52286 52287 7154a08 2 API calls 52273->52287 52288 71543e8 2 API calls 52273->52288 52274->52252 52275->52274 52276->52274 52277->52274 52278->52274 52279->52274 52280->52274 52281->52274 52282->52274 52283->52274 52284->52274 52285->52274 52286->52274 52287->52274 52288->52274 52290 7154d6a 52289->52290 52373 7150fb0 52290->52373 52377 7150fa8 52290->52377 52291 7154518 52291->52263 52291->52291 52292 71544ab 52292->52263 52292->52291 52365 71513c4 52292->52365 52369 71513d0 52292->52369 52298 715442b 52297->52298 52298->52263 52299 7154518 52298->52299 52300 71513c4 CreateProcessA 52298->52300 52301 71513d0 CreateProcessA 52298->52301 52299->52263 52300->52298 52301->52298 52381 7151140 52302->52381 52385 7151148 52302->52385 52303 7154a36 52311 7151140 WriteProcessMemory 52306->52311 52312 7151148 WriteProcessMemory 52306->52312 52307 7154518 52307->52263 52307->52307 52308 71544ab 52308->52263 52308->52307 52309 71513c4 CreateProcessA 52308->52309 52310 71513d0 CreateProcessA 52308->52310 52309->52308 52310->52308 52311->52308 52312->52308 52314 715472c 52313->52314 52389 7150f00 52314->52389 52393 7150ef8 52314->52393 52315 7154741 52315->52263 52319 715495e 52318->52319 52320 7155019 52319->52320 52321 7151140 WriteProcessMemory 52319->52321 52322 7151148 WriteProcessMemory 52319->52322 52320->52263 52321->52319 52322->52319 52324 715495e 52323->52324 52325 7155019 52324->52325 52326 7151140 WriteProcessMemory 52324->52326 52327 7151148 WriteProcessMemory 52324->52327 52325->52263 52326->52324 52327->52324 52329 71547b2 52328->52329 52331 7150fb0 Wow64SetThreadContext 52329->52331 52332 7150fa8 Wow64SetThreadContext 52329->52332 52330 71547cd 52331->52330 52332->52330 52334 71544ab 52333->52334 52334->52263 52335 7154518 52334->52335 52336 71513c4 CreateProcessA 52334->52336 52337 71513d0 CreateProcessA 52334->52337 52335->52263 52335->52335 52336->52334 52337->52334 52339 7154cbc 52338->52339 52397 7151231 52339->52397 52401 7151238 52339->52401 52340 7154cdf 52344 715472c 52343->52344 52345 7154741 52344->52345 52346 7150f00 ResumeThread 52344->52346 52347 7150ef8 ResumeThread 52344->52347 52345->52263 52346->52345 52347->52345 52405 7151088 52348->52405 52409 7151080 52348->52409 52349 71544ab 52349->52263 52350 7154518 52349->52350 52351 71513c4 CreateProcessA 52349->52351 52352 71513d0 CreateProcessA 52349->52352 52350->52263 52350->52350 52351->52349 52352->52349 52356 7154cbd 52355->52356 52357 7154cdf 52356->52357 52358 7151231 ReadProcessMemory 52356->52358 52359 7151238 ReadProcessMemory 52356->52359 52358->52357 52359->52357 52362 71544ab 52360->52362 52361 7154518 52361->52263 52362->52263 52362->52361 52363 71513c4 CreateProcessA 52362->52363 52364 71513d0 CreateProcessA 52362->52364 52363->52362 52364->52362 52366 71513d0 CreateProcessA 52365->52366 52368 715161b 52366->52368 52370 7151459 CreateProcessA 52369->52370 52372 715161b 52370->52372 52374 7150ff5 Wow64SetThreadContext 52373->52374 52376 715103d 52374->52376 52376->52292 52378 7150fb0 Wow64SetThreadContext 52377->52378 52380 715103d 52378->52380 52380->52292 52382 7151148 WriteProcessMemory 52381->52382 52384 71511e7 52382->52384 52384->52303 52386 7151190 WriteProcessMemory 52385->52386 52388 71511e7 52386->52388 52388->52303 52390 7150f40 ResumeThread 52389->52390 52392 7150f71 52390->52392 52392->52315 52394 7150f00 ResumeThread 52393->52394 52396 7150f71 52394->52396 52396->52315 52398 7151238 ReadProcessMemory 52397->52398 52400 71512c7 52398->52400 52400->52340 52402 7151283 ReadProcessMemory 52401->52402 52404 71512c7 52402->52404 52404->52340 52406 71510c8 VirtualAllocEx 52405->52406 52408 7151105 52406->52408 52408->52349 52410 7151088 VirtualAllocEx 52409->52410 52412 7151105 52410->52412 52412->52349 52215 4cc4040 52216 4cc4082 52215->52216 52218 4cc4089 52215->52218 52217 4cc40da CallWindowProcW 52216->52217 52216->52218 52217->52218 52219 534c078 52220 534c0c6 DrawTextExW 52219->52220 52222 534c11e 52220->52222 52413 71552e8 52414 71554a8 52413->52414 52415 715530e 52413->52415 52416 7155473 52415->52416 52419 7155561 52415->52419 52422 7155568 PostMessageW 52415->52422 52416->52416 52420 7155568 PostMessageW 52419->52420 52421 71555d4 52420->52421 52421->52415 52423 71555d4 52422->52423 52423->52415 52424 2564668 52425 256467a 52424->52425 52426 2564686 52425->52426 52428 2564779 52425->52428 52429 256479d 52428->52429 52433 2564879 52429->52433 52437 2564888 52429->52437 52435 25648af 52433->52435 52434 256498c 52435->52434 52441 25644b4 52435->52441 52439 25648af 52437->52439 52438 256498c 52439->52438 52440 25644b4 CreateActCtxA 52439->52440 52440->52438 52442 2565918 CreateActCtxA 52441->52442 52444 25659db 52442->52444
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1729562440.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5340000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (o^q$(o^q$,bq$,bq$Hbq
                                                                          • API String ID: 0-3486158592
                                                                          • Opcode ID: ce58e14b61b3019e94d9bfb7dd501a0e3529fd9421ce677c64da8cacfb6514b4
                                                                          • Instruction ID: 26b37417054b67bacec21165662fb5def85ec0d07852eedf691a727906b9062f
                                                                          • Opcode Fuzzy Hash: ce58e14b61b3019e94d9bfb7dd501a0e3529fd9421ce677c64da8cacfb6514b4
                                                                          • Instruction Fuzzy Hash: 23527E34A001159FDB18DF69D894AAEBBF6FF88310B198169E806DB361CB71EC45CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 678 71a34b8-71a34e0 679 71a34e2 678->679 680 71a34e7-71a35a3 678->680 679->680 683 71a35a8-71a35b5 680->683 684 71a35a5-71a35cb 680->684 683->684 686 71a3abb-71a3afd 684->686 687 71a35d1-71a35fb 684->687 696 71a3b00-71a3b04 686->696 690 71a3cc8-71a3cd4 687->690 691 71a3601-71a3619 687->691 692 71a3cda-71a3ce3 690->692 691->692 693 71a361f-71a3620 691->693 697 71a3ce9-71a3cf5 692->697 695 71a3cae-71a3cba 693->695 700 71a3cc0-71a3cc7 695->700 701 71a3625-71a3631 695->701 698 71a3b0a-71a3b10 696->698 699 71a36d6-71a36da 696->699 710 71a3cfb-71a3d07 697->710 698->686 706 71a3b12-71a3b6d 698->706 702 71a36ec-71a36f2 699->702 703 71a36dc-71a36ea 699->703 704 71a3638-71a3653 701->704 705 71a3633 701->705 708 71a3737-71a373b 702->708 707 71a374a-71a377c 703->707 704->697 709 71a3659-71a367e 704->709 705->704 725 71a3b6f-71a3ba2 706->725 726 71a3ba4-71a3bce 706->726 731 71a377e-71a378a 707->731 732 71a37a6 707->732 711 71a373d 708->711 712 71a36f4-71a3700 708->712 709->710 723 71a3684-71a3686 709->723 719 71a3d0d-71a3d14 710->719 718 71a3740-71a3744 711->718 715 71a3702 712->715 716 71a3707-71a370f 712->716 715->716 721 71a3711-71a3725 716->721 722 71a3734 716->722 718->707 724 71a36bc-71a36d3 718->724 728 71a372b-71a3732 721->728 729 71a3689-71a3694 721->729 722->708 723->729 724->699 739 71a3bd7-71a3c56 725->739 726->739 728->711 729->719 733 71a369a-71a36b7 729->733 735 71a378c-71a3792 731->735 736 71a3794-71a379a 731->736 738 71a37ac-71a37d9 732->738 733->718 740 71a37a4 735->740 736->740 745 71a37db-71a3813 738->745 746 71a3828-71a38bb 738->746 753 71a3c5d-71a3c70 739->753 740->738 754 71a3c7f-71a3c84 745->754 761 71a38bd 746->761 762 71a38c4-71a38c5 746->762 753->754 755 71a3c9b-71a3cab 754->755 756 71a3c86-71a3c94 754->756 755->695 756->755 761->762 763 71a3916-71a391c 762->763 764 71a391e-71a39e0 763->764 765 71a38c7-71a38e6 763->765 776 71a39e2-71a3a1b 764->776 777 71a3a21-71a3a25 764->777 766 71a38e8 765->766 767 71a38ed-71a3913 765->767 766->767 767->763 776->777 778 71a3a66-71a3a6a 777->778 779 71a3a27-71a3a60 777->779 780 71a3aab-71a3aaf 778->780 781 71a3a6c-71a3aa5 778->781 779->778 780->706 783 71a3ab1-71a3ab9 780->783 781->780 783->696
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'^q$:$pbq$~
                                                                          • API String ID: 0-999388165
                                                                          • Opcode ID: fca6c60f893e9daeec47daefe27513bffad6e2c4146ea6258e440af06ba8e636
                                                                          • Instruction ID: f2bed31059a106596b7d41f64f047e65b8d4f86c4b3c736a8eb141eaf9e15d51
                                                                          • Opcode Fuzzy Hash: fca6c60f893e9daeec47daefe27513bffad6e2c4146ea6258e440af06ba8e636
                                                                          • Instruction Fuzzy Hash: A242E4B9A00218DFDB19CFA9C944B99BBB2FF49300F1580E9E509AB265D731DE91DF10

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1056 71a2106-71a210a 1057 71a210b-71a2120 1056->1057 1058 71a2acd-71a2adf 1056->1058 1057->1058 1059 71a2121-71a212c 1057->1059 1061 71a2132-71a213e 1059->1061 1062 71a214a-71a2159 1061->1062 1064 71a21b8-71a21bc 1062->1064 1065 71a21c2-71a21cb 1064->1065 1066 71a2264-71a22ce 1064->1066 1067 71a21d1-71a21e7 1065->1067 1068 71a20c6-71a20d2 1065->1068 1066->1058 1104 71a22d4-71a281b 1066->1104 1075 71a2239-71a224b 1067->1075 1076 71a21e9-71a21ec 1067->1076 1068->1058 1069 71a20d8-71a20e4 1068->1069 1071 71a215b-71a2161 1069->1071 1072 71a20e6-71a20fa 1069->1072 1071->1058 1077 71a2167-71a217f 1071->1077 1072->1071 1082 71a20fc-71a2105 1072->1082 1086 71a2a0c-71a2ac2 1075->1086 1087 71a2251-71a2254 1075->1087 1076->1058 1079 71a21f2-71a222f 1076->1079 1077->1058 1085 71a2185-71a21ad 1077->1085 1079->1066 1100 71a2231-71a2237 1079->1100 1082->1056 1085->1064 1086->1058 1089 71a2257-71a2261 1087->1089 1100->1075 1100->1076 1182 71a281d-71a2827 1104->1182 1183 71a2832-71a28c5 1104->1183 1184 71a282d 1182->1184 1185 71a28d0-71a2963 1182->1185 1183->1185 1187 71a296e-71a2a01 1184->1187 1185->1187 1187->1086
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: D
                                                                          • API String ID: 0-2746444292
                                                                          • Opcode ID: d37ae46b0992666e9527388fc7ce49183ed08f0e4e954e5b0b0e1169ac52f623
                                                                          • Instruction ID: 88a7e5f944de2be511e130b1e59aefd67de6c25c6860d6d9d8171dacf55267bf
                                                                          • Opcode Fuzzy Hash: d37ae46b0992666e9527388fc7ce49183ed08f0e4e954e5b0b0e1169ac52f623
                                                                          • Instruction Fuzzy Hash: 1952D674A002289FDB64DF68D998A9DBBB6FF88310F1041D9D509A73A5DB34AEC1CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: cab7aae84d8d0d95eea962f11818967d453b0fbff434a1e047f48da56dc51838
                                                                          • Instruction ID: 38770ee8f6215e0c2d83246d45fd1415798ec95c751100e6bca33518700208f3
                                                                          • Opcode Fuzzy Hash: cab7aae84d8d0d95eea962f11818967d453b0fbff434a1e047f48da56dc51838
                                                                          • Instruction Fuzzy Hash: 2022B9B0701205CFDB19DB69C564BAEB7F7AF89B00F544069E9169B3A0CB31ED41CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2ee3fab1766caeb4ed05a28ee309fce09621c7afe2629d3d8444b9b330de9c31
                                                                          • Instruction ID: b808bdabd11579d969ba62b0a3cbc9012c973a2309895f50001ab4f7866713a7
                                                                          • Opcode Fuzzy Hash: 2ee3fab1766caeb4ed05a28ee309fce09621c7afe2629d3d8444b9b330de9c31
                                                                          • Instruction Fuzzy Hash: 488105B1D55269CFDB28CF66C8407EDB7B6BF89300F1085AAD819A6290EB745AC5CF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 99efa53b68350367acf220c33b450b9fda09c4315553d5d7ddd928b67e9f61cb
                                                                          • Instruction ID: 2ee2871c0cfe61f366d223d53006132ec3d7abb6b9ad35a0026cc2339d15b121
                                                                          • Opcode Fuzzy Hash: 99efa53b68350367acf220c33b450b9fda09c4315553d5d7ddd928b67e9f61cb
                                                                          • Instruction Fuzzy Hash: 2F411BF5D19208DBDB0DCFA6D5447EDBBFABB4A300F10A026D929A6295D734584ACF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d660a63f8c55691844f687a8da176a6a5cfdc219f4f3efae8e87bb516beeebdd
                                                                          • Instruction ID: f51fc5aadcc8d54424a19ead58278e2b30249e63c09c0a2b4c3c6a43b94f67d8
                                                                          • Opcode Fuzzy Hash: d660a63f8c55691844f687a8da176a6a5cfdc219f4f3efae8e87bb516beeebdd
                                                                          • Instruction Fuzzy Hash: 45215EB6D057099BEB09CFAB88012AAFBF7AFC9300F08C0B6D40C66155EB741645CF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 15d80a879d399c49d5eef49a0f79dbdae433c428e2c3149adc1a2fae6abbaafe
                                                                          • Instruction ID: eb42ae042646a432d737f04929a712f44b10dde9112aabd1816dd1b200bced3f
                                                                          • Opcode Fuzzy Hash: 15d80a879d399c49d5eef49a0f79dbdae433c428e2c3149adc1a2fae6abbaafe
                                                                          • Instruction Fuzzy Hash: 69B012C0CBF180EEC10F192004003F8943E0517000F0734424D77330C31200C418111E

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 294 71a2c38-71a2c4a 296 71a2c4c-71a2c4e 294->296 297 71a2c53-71a2c5f 294->297 298 71a2d26-71a2d2b 296->298 300 71a2c68-71a2c7d 297->300 301 71a2c61-71a2c63 297->301 304 71a2c7f-71a2c8a 300->304 305 71a2c91-71a2c9d 300->305 301->298 304->305 308 71a2caa-71a2cac 305->308 309 71a2c9f-71a2ca8 305->309 310 71a2cae-71a2cba 308->310 311 71a2cbc-71a2cc0 308->311 309->308 310->311 316 71a2cd2-71a2cdc 310->316 313 71a2cce-71a2cd0 311->313 314 71a2cc2-71a2ccc 311->314 313->298 318 71a2d38-71a2d44 314->318 320 71a2cde-71a2cea 316->320 321 71a2d2c-71a2d36 316->321 323 71a2d51-71a2d53 318->323 324 71a2d46-71a2d4f 318->324 327 71a2cfc-71a2cfe 320->327 328 71a2cec-71a2cfa 320->328 321->318 323->298 324->298 327->298 328->327 331 71a2d00-71a2d06 328->331 332 71a2d0a 331->332 333 71a2d08 331->333 334 71a2d0c-71a2d0e 332->334 333->334 335 71a2d10-71a2d1c 334->335 336 71a2d55-71a2de1 334->336 335->336 339 71a2d1e 335->339 349 71a2def-71a2e0b 336->349 350 71a2de3-71a2ded 336->350 339->298 356 71a2e0d-71a2e21 349->356 357 71a2e23-71a2e25 349->357 350->349 353 71a2e28-71a2e3c 350->353 360 71a2e43-71a2e79 353->360 356->357 356->360 365 71a2f4e-71a2f51 360->365 366 71a2e7f-71a2e91 360->366 368 71a2e93-71a2e96 366->368 369 71a2ea6-71a2ea9 366->369 370 71a2f1b-71a2f21 368->370 371 71a2e9c-71a2e9f 368->371 372 71a2eab-71a2eae 369->372 373 71a2eb9-71a2ebf 369->373 378 71a2f23-71a2f25 370->378 379 71a2f27-71a2f33 370->379 374 71a2eea-71a2ef0 371->374 375 71a2ea1 371->375 376 71a2f4a-71a2f4c 372->376 377 71a2eb4 372->377 380 71a2ec1-71a2ec3 373->380 381 71a2ec5-71a2ed1 373->381 382 71a2ef2-71a2ef4 374->382 383 71a2ef6-71a2f02 374->383 375->376 376->365 384 71a2f52-71a2fe5 376->384 377->376 385 71a2f35-71a2f48 378->385 379->385 386 71a2ed3-71a2ee8 380->386 381->386 387 71a2f04-71a2f19 382->387 383->387 402 71a2fec-71a3000 384->402 403 71a2fe7 384->403 385->376 386->376 387->376 404 71a3006-71a300b 402->404 405 71a30f4 402->405 403->402 406 71a3011-71a3016 404->406 407 71a30c6-71a30c9 call 71a84f8 404->407 408 71a30fa-71a30fb 405->408 409 71a301c-71a301d 406->409 410 71a3100 call 71a32c3 406->410 411 71a30cf-71a30da 407->411 408->404 439 71a3020 call 71a3d9e 409->439 440 71a3020 call 71a3d21 409->440 413 71a3106-71a3107 410->413 419 71a30dc-71a30e0 411->419 420 71a30e3 411->420 412 71a3026-71a3033 414 71a3039-71a303d 412->414 415 71a310c-71a3113 412->415 413->409 417 71a3118-71a311f 414->417 418 71a3043-71a305b 414->418 415->414 417->418 426 71a3061-71a3067 call 71a43b0 418->426 427 71a3124-71a312b 418->427 421 71a30e2 419->421 422 71a3086-71a309c call 71a6c18 419->422 437 71a30e3 call 7155270 420->437 438 71a30e3 call 7155280 420->438 421->420 443 71a309f call 71a7ef9 422->443 444 71a309f call 71a7f41 422->444 425 71a30e9-71a30f1 429 71a306d-71a307a 426->429 427->426 431 71a3130-71a3137 429->431 432 71a3080 429->432 430 71a30a5-71a30b2 430->420 433 71a30b4-71a30b7 call 71a83c8 430->433 431->432 432->422 434 71a30bd-71a30c3 433->434 434->407 437->425 438->425 439->412 440->412 443->430 444->430
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'^q$4'^q$4'^q$4|cq$4|cq$$^q
                                                                          • API String ID: 0-1027864050
                                                                          • Opcode ID: 27925891490633dffcb99c52119b723989b369ed16db6e76e99a9d50a354171a
                                                                          • Instruction ID: 38f3ac8f720d69511ce44b6545428841e9cd323fe00e86baa71e0bc40c4c8d16
                                                                          • Opcode Fuzzy Hash: 27925891490633dffcb99c52119b723989b369ed16db6e76e99a9d50a354171a
                                                                          • Instruction Fuzzy Hash: 70E1D1B5B002169FCB199F78D85866E7BEABFCA710B154469E006DB3A2DF34DC41CB90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1211 71513c4-7151465 1214 7151467-7151471 1211->1214 1215 715149e-71514be 1211->1215 1214->1215 1216 7151473-7151475 1214->1216 1220 71514f7-7151526 1215->1220 1221 71514c0-71514ca 1215->1221 1218 7151477-7151481 1216->1218 1219 7151498-715149b 1216->1219 1222 7151485-7151494 1218->1222 1223 7151483 1218->1223 1219->1215 1231 715155f-7151619 CreateProcessA 1220->1231 1232 7151528-7151532 1220->1232 1221->1220 1225 71514cc-71514ce 1221->1225 1222->1222 1224 7151496 1222->1224 1223->1222 1224->1219 1226 71514f1-71514f4 1225->1226 1227 71514d0-71514da 1225->1227 1226->1220 1229 71514dc 1227->1229 1230 71514de-71514ed 1227->1230 1229->1230 1230->1230 1234 71514ef 1230->1234 1243 7151622-71516a8 1231->1243 1244 715161b-7151621 1231->1244 1232->1231 1233 7151534-7151536 1232->1233 1235 7151559-715155c 1233->1235 1236 7151538-7151542 1233->1236 1234->1226 1235->1231 1238 7151544 1236->1238 1239 7151546-7151555 1236->1239 1238->1239 1239->1239 1240 7151557 1239->1240 1240->1235 1254 71516b8-71516bc 1243->1254 1255 71516aa-71516ae 1243->1255 1244->1243 1257 71516cc-71516d0 1254->1257 1258 71516be-71516c2 1254->1258 1255->1254 1256 71516b0 1255->1256 1256->1254 1260 71516e0-71516e4 1257->1260 1261 71516d2-71516d6 1257->1261 1258->1257 1259 71516c4 1258->1259 1259->1257 1263 71516f6-71516fd 1260->1263 1264 71516e6-71516ec 1260->1264 1261->1260 1262 71516d8 1261->1262 1262->1260 1265 7151714 1263->1265 1266 71516ff-715170e 1263->1266 1264->1263 1268 7151715 1265->1268 1266->1265 1268->1268
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07151606
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 9bf4c2ffcbf4b274c8306121ed12671f45c24df1d2c31f1fe4533f17409c117b
                                                                          • Instruction ID: a4ed0d97393af8260afba9c4c51e5e96f4debdaa92c456a4fbc1cb16d871c3f1
                                                                          • Opcode Fuzzy Hash: 9bf4c2ffcbf4b274c8306121ed12671f45c24df1d2c31f1fe4533f17409c117b
                                                                          • Instruction Fuzzy Hash: 97A16DB1D0021EDFDB15CF68C8407EDBBB2BF48310F1485A9E818A7290D7749985DF92

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1269 71513d0-7151465 1271 7151467-7151471 1269->1271 1272 715149e-71514be 1269->1272 1271->1272 1273 7151473-7151475 1271->1273 1277 71514f7-7151526 1272->1277 1278 71514c0-71514ca 1272->1278 1275 7151477-7151481 1273->1275 1276 7151498-715149b 1273->1276 1279 7151485-7151494 1275->1279 1280 7151483 1275->1280 1276->1272 1288 715155f-7151619 CreateProcessA 1277->1288 1289 7151528-7151532 1277->1289 1278->1277 1282 71514cc-71514ce 1278->1282 1279->1279 1281 7151496 1279->1281 1280->1279 1281->1276 1283 71514f1-71514f4 1282->1283 1284 71514d0-71514da 1282->1284 1283->1277 1286 71514dc 1284->1286 1287 71514de-71514ed 1284->1287 1286->1287 1287->1287 1291 71514ef 1287->1291 1300 7151622-71516a8 1288->1300 1301 715161b-7151621 1288->1301 1289->1288 1290 7151534-7151536 1289->1290 1292 7151559-715155c 1290->1292 1293 7151538-7151542 1290->1293 1291->1283 1292->1288 1295 7151544 1293->1295 1296 7151546-7151555 1293->1296 1295->1296 1296->1296 1297 7151557 1296->1297 1297->1292 1311 71516b8-71516bc 1300->1311 1312 71516aa-71516ae 1300->1312 1301->1300 1314 71516cc-71516d0 1311->1314 1315 71516be-71516c2 1311->1315 1312->1311 1313 71516b0 1312->1313 1313->1311 1317 71516e0-71516e4 1314->1317 1318 71516d2-71516d6 1314->1318 1315->1314 1316 71516c4 1315->1316 1316->1314 1320 71516f6-71516fd 1317->1320 1321 71516e6-71516ec 1317->1321 1318->1317 1319 71516d8 1318->1319 1319->1317 1322 7151714 1320->1322 1323 71516ff-715170e 1320->1323 1321->1320 1325 7151715 1322->1325 1323->1322 1325->1325
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 07151606
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 9ff71365b1f4b7a4f8edd540c3ecf64d868e1d24af4b22f832b28ce02c3c4d78
                                                                          • Instruction ID: ca774dfbbd17dd33fd39668f8ca905c6ad1d12a94199dc9792ff66e71843cd47
                                                                          • Opcode Fuzzy Hash: 9ff71365b1f4b7a4f8edd540c3ecf64d868e1d24af4b22f832b28ce02c3c4d78
                                                                          • Instruction Fuzzy Hash: 78916CB1D0021EDFDB25CF68C8407EDBBB2BF48314F1481A9E818A7290DB749985DF92

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1326 256ad68-256ad77 1327 256ada3-256ada7 1326->1327 1328 256ad79-256ad86 call 256a08c 1326->1328 1330 256adbb-256adfc 1327->1330 1331 256ada9-256adb3 1327->1331 1334 256ad9c 1328->1334 1335 256ad88 1328->1335 1337 256adfe-256ae06 1330->1337 1338 256ae09-256ae17 1330->1338 1331->1330 1334->1327 1381 256ad8e call 256b000 1335->1381 1382 256ad8e call 256afff 1335->1382 1337->1338 1339 256ae3b-256ae3d 1338->1339 1340 256ae19-256ae1e 1338->1340 1342 256ae40-256ae47 1339->1342 1343 256ae20-256ae27 call 256a098 1340->1343 1344 256ae29 1340->1344 1341 256ad94-256ad96 1341->1334 1345 256aed8-256af98 1341->1345 1347 256ae54-256ae5b 1342->1347 1348 256ae49-256ae51 1342->1348 1349 256ae2b-256ae39 1343->1349 1344->1349 1376 256afa0-256afcb GetModuleHandleW 1345->1376 1377 256af9a-256af9d 1345->1377 1352 256ae5d-256ae65 1347->1352 1353 256ae68-256ae71 call 256a0a8 1347->1353 1348->1347 1349->1342 1352->1353 1357 256ae73-256ae7b 1353->1357 1358 256ae7e-256ae83 1353->1358 1357->1358 1359 256ae85-256ae8c 1358->1359 1360 256aea1-256aea5 1358->1360 1359->1360 1362 256ae8e-256ae9e call 256a0b8 call 256a0c8 1359->1362 1364 256aeab-256aeae 1360->1364 1362->1360 1367 256aeb0-256aece 1364->1367 1368 256aed1-256aed7 1364->1368 1367->1368 1378 256afd4-256afe8 1376->1378 1379 256afcd-256afd3 1376->1379 1377->1376 1379->1378 1381->1341 1382->1341
                                                                          APIs
                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0256AFBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 3f74614feccd1d936b815acd934a8dac970c4127048d8c86ae26af635aca8612
                                                                          • Instruction ID: 4133112ee380361d657b1b65d801ae3a675f26768cbd4565fd84a79fe109ff62
                                                                          • Opcode Fuzzy Hash: 3f74614feccd1d936b815acd934a8dac970c4127048d8c86ae26af635aca8612
                                                                          • Instruction Fuzzy Hash: C8712570A00B058FD724DF69D04476ABBF2FF88314F108A2DD48AE7A50DB75E949CB99

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1383 25644b4-25659d9 CreateActCtxA 1386 25659e2-2565a3c 1383->1386 1387 25659db-25659e1 1383->1387 1394 2565a3e-2565a41 1386->1394 1395 2565a4b-2565a4f 1386->1395 1387->1386 1394->1395 1396 2565a60 1395->1396 1397 2565a51-2565a5d 1395->1397 1399 2565a61 1396->1399 1397->1396 1399->1399
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 025659C9
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: 88939e87817d8dffe6b2853c9402276061bf6208be14f49cffb3dd93f32800a6
                                                                          • Instruction ID: 86bed3be5920a8d8a1a14175c0efe4f8ad916755692f46cbd9351c41da9c131c
                                                                          • Opcode Fuzzy Hash: 88939e87817d8dffe6b2853c9402276061bf6208be14f49cffb3dd93f32800a6
                                                                          • Instruction Fuzzy Hash: 8641F2B0D00719DBDB24DFA9C8487DDBBF5BF48304F64806AD408AB251EB756945CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1416 4cc4040-4cc407c 1417 4cc412c-4cc414c 1416->1417 1418 4cc4082-4cc4087 1416->1418 1425 4cc414f-4cc415c 1417->1425 1419 4cc4089-4cc40c0 1418->1419 1420 4cc40da-4cc4112 CallWindowProcW 1418->1420 1426 4cc40c9-4cc40d8 1419->1426 1427 4cc40c2-4cc40c8 1419->1427 1421 4cc411b-4cc412a 1420->1421 1422 4cc4114-4cc411a 1420->1422 1421->1425 1422->1421 1426->1425 1427->1426
                                                                          APIs
                                                                          • CallWindowProcW.USER32(?,?,?,?,?), ref: 04CC4101
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1728838296.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_4cc0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: CallProcWindow
                                                                          • String ID:
                                                                          • API String ID: 2714655100-0
                                                                          • Opcode ID: 76bc27e48001372321cd22aa43a4bead6ecaa0f70a9abbc89679dbe69720e9db
                                                                          • Instruction ID: 6a07bbf847d37722ab371c24d3fc543ee056bd06c309acba927b308a4266465d
                                                                          • Opcode Fuzzy Hash: 76bc27e48001372321cd22aa43a4bead6ecaa0f70a9abbc89679dbe69720e9db
                                                                          • Instruction Fuzzy Hash: E34138B8A00305DFDB14CF99C448AAAFBF6FB88314F24C458D559AB321D375A941CFA4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1400 2565917-25659d9 CreateActCtxA 1402 25659e2-2565a3c 1400->1402 1403 25659db-25659e1 1400->1403 1410 2565a3e-2565a41 1402->1410 1411 2565a4b-2565a4f 1402->1411 1403->1402 1410->1411 1412 2565a60 1411->1412 1413 2565a51-2565a5d 1411->1413 1415 2565a61 1412->1415 1413->1412 1415->1415
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 025659C9
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: e9f1d58335b2ec89e4d920f58816463bbb357428b7c6e0d798429addbea91c38
                                                                          • Instruction ID: 70ddc11ae569b6dfa37d4aee21d7b7bdac1998da0ad629d9d3bbf1985299fc42
                                                                          • Opcode Fuzzy Hash: e9f1d58335b2ec89e4d920f58816463bbb357428b7c6e0d798429addbea91c38
                                                                          • Instruction Fuzzy Hash: A741E2B0C00719DFDB24DFA9C8847DDBBB5BF48304F64806AD408AB255EB75698ACF90
                                                                          APIs
                                                                          • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0534C10F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1729562440.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5340000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: DrawText
                                                                          • String ID:
                                                                          • API String ID: 2175133113-0
                                                                          • Opcode ID: 8fb02ea0d435c1b2ce96bbe9cbeb9441e5d454ace1c858f385d3ba84479f58b1
                                                                          • Instruction ID: 10b1273f6907e056f6208f514b26ce6a7acbfd5f0813868fd4282ed7267ec2a3
                                                                          • Opcode Fuzzy Hash: 8fb02ea0d435c1b2ce96bbe9cbeb9441e5d454ace1c858f385d3ba84479f58b1
                                                                          • Instruction Fuzzy Hash: EC31EEB5D013099FCB10CF9AD884AEEFBF5FB48320F54842AE819A7210D774A940CFA4
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071511D8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: ffc377922e987e5fc1a8a007cf8e7bbf86b7e6f19fb5b9d82b3ab6f7ce0e9aba
                                                                          • Instruction ID: 6d6ab204c8723e9f375466c434af4dd03b933f75a577472d942e0877cface33b
                                                                          • Opcode Fuzzy Hash: ffc377922e987e5fc1a8a007cf8e7bbf86b7e6f19fb5b9d82b3ab6f7ce0e9aba
                                                                          • Instruction Fuzzy Hash: 232124B69003199FCB14CFA9C985BEEBBF5FF48310F10842AE958A7240D7789945CBA5
                                                                          APIs
                                                                          • DrawTextExW.USER32(?,?,?,?,?,?), ref: 0534C10F
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1729562440.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5340000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: DrawText
                                                                          • String ID:
                                                                          • API String ID: 2175133113-0
                                                                          • Opcode ID: 85f4aa451c1c5366d1f995335aeaad2fa1baa621b4349e419b46f255eae632cc
                                                                          • Instruction ID: 5c9b44e9c6f8b860b953cd0f1a1df0ca4734fb253ba2bfb1499f6de86d429732
                                                                          • Opcode Fuzzy Hash: 85f4aa451c1c5366d1f995335aeaad2fa1baa621b4349e419b46f255eae632cc
                                                                          • Instruction Fuzzy Hash: D521BFB5D013099FDB10CF9AD884AEEFBF5FB48320F14842AE919A7210D775A944CFA5
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 071511D8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: ef407affef8a73172ba8486a31dbad6a609f21e4d624f64228506dc84f67df52
                                                                          • Instruction ID: a29a4b922ac2aae6a4ad5e1aba33d08e87007ccced6386e05577778b3811c564
                                                                          • Opcode Fuzzy Hash: ef407affef8a73172ba8486a31dbad6a609f21e4d624f64228506dc84f67df52
                                                                          • Instruction Fuzzy Hash: 112146B1900319DFCB10CFA9C984BDEBBF5FF48310F108429E958A7240C7789944CBA4
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0715102E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: a6a20d6d2dc849d67738d245387218f00d968c2a348a1363583528443a5d1da1
                                                                          • Instruction ID: 4ef55a52a2c44f8ded13938449dbb08a572309c4583b91ab984edb148b4940ad
                                                                          • Opcode Fuzzy Hash: a6a20d6d2dc849d67738d245387218f00d968c2a348a1363583528443a5d1da1
                                                                          • Instruction Fuzzy Hash: CC2159B19003099FDB10DFAAC4857EEBBF4EF48314F508429D859A7240D778A945CFA5
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0256D616,?,?,?,?,?), ref: 0256D6D7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: ce810e408d0d0ad44e5471bcb574846d147942a32cfaa4f815f0ee466e88af78
                                                                          • Instruction ID: 6520c5b875f9624dbf0ef14f12918c950d2716fdcb1eed171594b075044f3080
                                                                          • Opcode Fuzzy Hash: ce810e408d0d0ad44e5471bcb574846d147942a32cfaa4f815f0ee466e88af78
                                                                          • Instruction Fuzzy Hash: BA21E3B59012589FDB10CFAAD584AEEFFF4FB48314F14841AE958A7311D374A940CFA5
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071512B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: 86e4f3028fbe8f55d24b8cce837b16875e5a9cb48be89f762e62ecb2a0bdd860
                                                                          • Instruction ID: c792cb8be0bb710f70279d4ac046c6731ba7b1f78b452eff0d83a6fe23787bd1
                                                                          • Opcode Fuzzy Hash: 86e4f3028fbe8f55d24b8cce837b16875e5a9cb48be89f762e62ecb2a0bdd860
                                                                          • Instruction Fuzzy Hash: 812125B1800259DFCB10CFAAC940AEEFBF5FF48320F108429E958A7250D7349945CBA5
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 0715102E
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 57ff82cf23db2eeed8e52af7b73166fe4ba6e605eb0152eb22757eee53ae65d1
                                                                          • Instruction ID: 56a20009fce5748d4946343d6641e9ac779ae3985c048d919002f9b15e01617c
                                                                          • Opcode Fuzzy Hash: 57ff82cf23db2eeed8e52af7b73166fe4ba6e605eb0152eb22757eee53ae65d1
                                                                          • Instruction Fuzzy Hash: E32138B19003099FDB14DFAAC4857EEBBF4EF48324F50842AD859A7240D7789945CFA5
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 071512B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: ad605407777d6d64b65ddf55560595924e5abee44d6d80b57272bdb4bd2086b0
                                                                          • Instruction ID: 449af266c8ff76d906463db3511fc73f88cc4809450f45c33e8574f5f7451065
                                                                          • Opcode Fuzzy Hash: ad605407777d6d64b65ddf55560595924e5abee44d6d80b57272bdb4bd2086b0
                                                                          • Instruction Fuzzy Hash: C22116B1900259DFCB10DFAAC944ADEFBF5FF48320F508429E958A7250C7349545DBA5
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,0256D616,?,?,?,?,?), ref: 0256D6D7
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: 6ae19aca53689818ac9d1736dd33361e33337b7a46c6cb3a56675773583cafcd
                                                                          • Instruction ID: 979fc82f7ab367fb52e04ea40d24c928bb4a6b31a6d4ba708d3317a7e4736164
                                                                          • Opcode Fuzzy Hash: 6ae19aca53689818ac9d1736dd33361e33337b7a46c6cb3a56675773583cafcd
                                                                          • Instruction Fuzzy Hash: DB2112B5900218DFDB10CFA9D584AEEBBF5FB48314F20842AE918A3310D334A940CF64
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @
                                                                          • API String ID: 0-2766056989
                                                                          • Opcode ID: b385a94b73b4eb3195b2b6b6e15804699509b2ead1de06dc8fb1b65922035a35
                                                                          • Instruction ID: c95b68e723f415a1e68e07e5dd8784b5fcf27711a7c2ffcbad93015a261fa611
                                                                          • Opcode Fuzzy Hash: b385a94b73b4eb3195b2b6b6e15804699509b2ead1de06dc8fb1b65922035a35
                                                                          • Instruction Fuzzy Hash: F7E1B3B9E04219DFDB54CFA8D980A9DBBF2FB49310F1481AAD819E7345E7319A81CF50
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071510F6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: c4e408944f2d46c8d80e1cfc669ac8565e56686b30c805abbe5dabeca7484514
                                                                          • Instruction ID: 82dd6169c7bd42f025381124d2d5eb5af059b019c21dbc55512b931d42cdfd57
                                                                          • Opcode Fuzzy Hash: c4e408944f2d46c8d80e1cfc669ac8565e56686b30c805abbe5dabeca7484514
                                                                          • Instruction Fuzzy Hash: D01167B68002499FCB20DFA9C944BDEBFF5EF48320F208419E859A7250C735A944CFA1
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 1f83cbc76aa039e3895aa0a1e920c28af8263fc4f90a88ec706c7b502c4640e7
                                                                          • Instruction ID: ca4a16628e02349bd138d6d06a5a0038a31294f4c0c3da159d5081f0375fe7ae
                                                                          • Opcode Fuzzy Hash: 1f83cbc76aa039e3895aa0a1e920c28af8263fc4f90a88ec706c7b502c4640e7
                                                                          • Instruction Fuzzy Hash: 561176B19003488BCB20DFAAC4457EEFBF4EB88324F20881ED459A7240CB34A585CBA5
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 071510F6
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 111972c8f1c5e313a3b2ddd241df466e7c62be906650d44d6f767e37612ef096
                                                                          • Instruction ID: 2386b1de32625d5245661e3fd0ea3e7e5add5226fd4e62a91cdb4e3dc0465e86
                                                                          • Opcode Fuzzy Hash: 111972c8f1c5e313a3b2ddd241df466e7c62be906650d44d6f767e37612ef096
                                                                          • Instruction Fuzzy Hash: 121129B59002499FCB20DFA9C845BDEBFF5EB48320F108419E555A7250C7759544CFA5
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: f3618508bfa61445953fcc730c8c20fb8a37a6da02f27c2452c8d0f99fd9f330
                                                                          • Instruction ID: cd0545e7730c943e01bb812027f06c45d3b425f42c23cd96668d00bab9ab6802
                                                                          • Opcode Fuzzy Hash: f3618508bfa61445953fcc730c8c20fb8a37a6da02f27c2452c8d0f99fd9f330
                                                                          • Instruction Fuzzy Hash: 981125B19003498BCB24DFAAC4457EEFBF4AB88324F20842AD459A7250CB75A945CFA5
                                                                          APIs
                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 0256AFBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: a932e63b2ee5a80e412674dabd5ab48d8048aa2c4de891693508776af1f99345
                                                                          • Instruction ID: 7d1d50f3d3d356d50ba9fc08c6335f3dad73b25cf97a8837fc769ee0b880148e
                                                                          • Opcode Fuzzy Hash: a932e63b2ee5a80e412674dabd5ab48d8048aa2c4de891693508776af1f99345
                                                                          • Instruction Fuzzy Hash: 631110B6C003498FCB20CF9AD448ADEFBF4AB88324F10842AD859B7610C379A545CFA5
                                                                          APIs
                                                                          • PostMessageW.USER32(?,?,?,?), ref: 071555C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: 32177d4d9ad59978151d4c050a2ba26c4e79f5413699e28f8ab79d6b0476b024
                                                                          • Instruction ID: 3485a78d030f3aa0f46cb5d4779ebe649c3ed013b3f3f0d14f82a7046cec2f5c
                                                                          • Opcode Fuzzy Hash: 32177d4d9ad59978151d4c050a2ba26c4e79f5413699e28f8ab79d6b0476b024
                                                                          • Instruction Fuzzy Hash: C711E0B5900349DFDB20CF9AC548BDEBFF9EB48324F10881AE958A7640C375A644CFA5
                                                                          APIs
                                                                          • PostMessageW.USER32(?,?,?,?), ref: 071555C5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: 9e779c4ab1ad5b27a6ea190c46b10445c1768d9e22c2c1b9a0bd63505ed68520
                                                                          • Instruction ID: 9b5afeaff3e3e1c2a26a72f1474e458b236ee17c3eb19e0f4b1e9415a64794d9
                                                                          • Opcode Fuzzy Hash: 9e779c4ab1ad5b27a6ea190c46b10445c1768d9e22c2c1b9a0bd63505ed68520
                                                                          • Instruction Fuzzy Hash: B91103B5800349DFCB20CF9AC544BDEFBF9EB48320F108419E958A7640C375A544CFA5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LR^q
                                                                          • API String ID: 0-2625958711
                                                                          • Opcode ID: 4165aaf319c943402965bf6cb37cfc3b9f4c3da637533509e2feecece6df3841
                                                                          • Instruction ID: 4ee7f88ccd4175e5b82a82ff3389c92e005587286a350566dfa22317077df807
                                                                          • Opcode Fuzzy Hash: 4165aaf319c943402965bf6cb37cfc3b9f4c3da637533509e2feecece6df3841
                                                                          • Instruction Fuzzy Hash: 2491F6B8E00219AFDB05DFA9D4816ADBBF2FB49310F108429E829E7381DB359942CF51
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: cef95fa38f7c68c7e4be3eb38dbed7dae45c4d1b0895a670e154b8242b2cda94
                                                                          • Instruction ID: 10294b4a1c666342cba3c722b708143d597a16fea5856e00b5ee674c2df4c138
                                                                          • Opcode Fuzzy Hash: cef95fa38f7c68c7e4be3eb38dbed7dae45c4d1b0895a670e154b8242b2cda94
                                                                          • Instruction Fuzzy Hash: 4B510F74B042069FCB01DF79D8484AEBBF7EFC5320718896AE055DB396DB309D1587A0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8bq
                                                                          • API String ID: 0-187764589
                                                                          • Opcode ID: 689149d4ef2d63f65d61b8fef7bf14e654836ccaf21bc9098df3cf1f56a7337e
                                                                          • Instruction ID: 36840345528ce73e9f9a2499bd000f8a9983c6e2334062c29f1fcdf281703603
                                                                          • Opcode Fuzzy Hash: 689149d4ef2d63f65d61b8fef7bf14e654836ccaf21bc9098df3cf1f56a7337e
                                                                          • Instruction Fuzzy Hash: FB41E8B9E00159AFDB05DFA8E4515AEBBB2FB89300F108429E819A7344DB759D42CF51
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8bq
                                                                          • API String ID: 0-187764589
                                                                          • Opcode ID: 168963ca37471bbc468a75ab1c4be9b3159cef7f419d3da536ace9ed126d8882
                                                                          • Instruction ID: 92de0db6c407f4bf40fa4576404778400a78d8022ad26cbf349654c3e7cdadb8
                                                                          • Opcode Fuzzy Hash: 168963ca37471bbc468a75ab1c4be9b3159cef7f419d3da536ace9ed126d8882
                                                                          • Instruction Fuzzy Hash: 4F4129B9E00149AFDB05DFA8D8505EEBBF2FB89300F14846AE819A7381DB359D42CF51
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 4fe578ccc8de5123817d3cb627ac470cf3a1a260853e43def2888a453f21d28c
                                                                          • Instruction ID: 634aa30ebb23ce0d858696379ce31c849619f1b45b0fe101ba788b17366416ef
                                                                          • Opcode Fuzzy Hash: 4fe578ccc8de5123817d3cb627ac470cf3a1a260853e43def2888a453f21d28c
                                                                          • Instruction Fuzzy Hash: 7F31C3B8E01209DFDB08CFE9D4849ADBBB6FF89301F10912AE909AB365C7319945CF10
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 337f85a943c13efd39285fee7f7eb866c8fa9c4693e4e9ee838bad5127010f3e
                                                                          • Instruction ID: 60ca32a8787935aca3f3ef7bf7042795c526279dab77493eafa8d746e8b12ad1
                                                                          • Opcode Fuzzy Hash: 337f85a943c13efd39285fee7f7eb866c8fa9c4693e4e9ee838bad5127010f3e
                                                                          • Instruction Fuzzy Hash: 8231A1B8E04209DFDB08CFA9D4849EDBBB5FF89310F14912AE919AB251C735A945CF50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 804423dd294660d64913845df8c013291c3be680c164c8480042ce2ab1fbfeeb
                                                                          • Instruction ID: 031dd51d40525f78f336f2efb7aa97d2c2b131cd6ac87fafb586229279342b1d
                                                                          • Opcode Fuzzy Hash: 804423dd294660d64913845df8c013291c3be680c164c8480042ce2ab1fbfeeb
                                                                          • Instruction Fuzzy Hash: 4731AF78E042099FCB08CFE9D4849EDBBB5EF49310F14912AE919AB265C7359945CB50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: d4d92616637c9331777ad08bbb137c90630723595cadfb10b8df2360bf348bca
                                                                          • Instruction ID: d10ff46e5a4d72c1c8f5a3b396d5940ba9ee961359bd45ad9c57e621383220e6
                                                                          • Opcode Fuzzy Hash: d4d92616637c9331777ad08bbb137c90630723595cadfb10b8df2360bf348bca
                                                                          • Instruction Fuzzy Hash: DD114FB5B0020A9BCB05EFB999105EEB6F2AB84210B10403AC509E7384EB358E16CBE1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: ;
                                                                          • API String ID: 0-1661535913
                                                                          • Opcode ID: 2567125fb68d0817a9ab96e8c4c231fa93ab61afc504a4d43e1020babef617f3
                                                                          • Instruction ID: 9eef2cdeb3e4a0011b49062f9968b59b371101a7d5ef743b68b8a45f7113fb29
                                                                          • Opcode Fuzzy Hash: 2567125fb68d0817a9ab96e8c4c231fa93ab61afc504a4d43e1020babef617f3
                                                                          • Instruction Fuzzy Hash: FE0140B8D0524BAFCB11CFB5D9456AEBBB9AB06300F1485A6D824E3381D7345B45CB91
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: m
                                                                          • API String ID: 0-3775001192
                                                                          • Opcode ID: fbafb6705c835965eeb38b44e55882dbb19dd7310bf511653d362c77723eaee7
                                                                          • Instruction ID: fe77dd080ab6c98f25b888eaa28a1a08380a4058722bb2b954038e59f25b039e
                                                                          • Opcode Fuzzy Hash: fbafb6705c835965eeb38b44e55882dbb19dd7310bf511653d362c77723eaee7
                                                                          • Instruction Fuzzy Hash: C5E0C2B8E05209FBCB08EFB4D4043ADBFB8A705300F000194C405532C1EB301B44CAA1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 6
                                                                          • API String ID: 0-498629140
                                                                          • Opcode ID: fea0c4250bf6b659f83df4d81675af28da18499b3f83bd75807d9177d8ebc1b3
                                                                          • Instruction ID: 2d445db24edc35388a0939cba4fe1e01852a096a248a1478cceb18a6cb515019
                                                                          • Opcode Fuzzy Hash: fea0c4250bf6b659f83df4d81675af28da18499b3f83bd75807d9177d8ebc1b3
                                                                          • Instruction Fuzzy Hash: 7CE0C2B4D09208FBDB15EFB4E4093AEBBBCAB09301F108195D40593280EF315A40D741
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 7
                                                                          • API String ID: 0-1790921346
                                                                          • Opcode ID: 9b74996ffe5fbeedb5a2f4028733fde79c7f0f6739c7d420646d4a5f607d51d6
                                                                          • Instruction ID: 0122bcbb5287eb1ca84e9980c25bd716c5b01607ff0c6a93f891959da064151c
                                                                          • Opcode Fuzzy Hash: 9b74996ffe5fbeedb5a2f4028733fde79c7f0f6739c7d420646d4a5f607d51d6
                                                                          • Instruction Fuzzy Hash: 32E0C2B890514CFBCB15EFF8E5057EDBBB8A705300F5101A4C80693280DBB41A44E641
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 48e4af2dab77d2017b6e59c157b93cea7e660846adb5dd7c02c7703fa3a32396
                                                                          • Instruction ID: 82988abd4d427a12e30d0c476f3968dc6d28a8085cb10bcf08b8f210d9f44dbe
                                                                          • Opcode Fuzzy Hash: 48e4af2dab77d2017b6e59c157b93cea7e660846adb5dd7c02c7703fa3a32396
                                                                          • Instruction Fuzzy Hash: 61B17EF4E15249EFCB14DFA8D940AEDBBB6FF49300F109625D409AB395DB30A985CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b1ccf2741e2cdfe4d92f9109c4b141e07084a97a84ac96ff1a708de48f6dd223
                                                                          • Instruction ID: 988047af7fc0d2df66ce2443dcb07203f8f8df28d3d82f1de426389174411f73
                                                                          • Opcode Fuzzy Hash: b1ccf2741e2cdfe4d92f9109c4b141e07084a97a84ac96ff1a708de48f6dd223
                                                                          • Instruction Fuzzy Hash: 67918FF4E15249EFCB14DFA8D940AEDBBB6FF49300F109625D409AB395DB30A985CB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a01e07052dc2930c065d4f4e6e327e7fea64f42eb38f6a3df56b1cdad3497727
                                                                          • Instruction ID: f3fc9cbde260004efd65acc5db581d248b6504b68a0941aee277f8d7305187b2
                                                                          • Opcode Fuzzy Hash: a01e07052dc2930c065d4f4e6e327e7fea64f42eb38f6a3df56b1cdad3497727
                                                                          • Instruction Fuzzy Hash: 848194B9E0421A9FDF11CFA8C890AAEBBB1EF49304F148469E819EB355D7319946CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7b165c534daf1eb3fc296afd321cbc82b8e3a0afe7505443d3e94c03694fb001
                                                                          • Instruction ID: 87c5d6c743a5acf959abcd35a1c1bec5b39baff1c1d5018fbeba1b3fb2610a87
                                                                          • Opcode Fuzzy Hash: 7b165c534daf1eb3fc296afd321cbc82b8e3a0afe7505443d3e94c03694fb001
                                                                          • Instruction Fuzzy Hash: 834109B8E00119EFDB05DFA9D480AAEBBF1EB49310F108569E819E7380DB319D42CF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 054b1ad453b1b8e86d9ad869e43e5c7555bc9b0ec03ed757ae7bf85efcc9ca83
                                                                          • Instruction ID: 97660f654e937db9c28e0eecb215a8f8cb89ba722dcec1e5f68f3a825233e78d
                                                                          • Opcode Fuzzy Hash: 054b1ad453b1b8e86d9ad869e43e5c7555bc9b0ec03ed757ae7bf85efcc9ca83
                                                                          • Instruction Fuzzy Hash: 54416CB4E00209AFDB06DFA9D44069EBBF2EB49310F14C56AE819E7391DB359D42CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 70170b8ae667b7a4919a2de9b3cc281a1e85c5ea603ea6b3f3103f73887c2f91
                                                                          • Instruction ID: fcd45c7fc15f45c10d23d6dc693b683608c79b36293430c4c6e4b97e90accbf8
                                                                          • Opcode Fuzzy Hash: 70170b8ae667b7a4919a2de9b3cc281a1e85c5ea603ea6b3f3103f73887c2f91
                                                                          • Instruction Fuzzy Hash: 8041F5B4E0021A9FDB05DFB9D85A6AEBBF5AF89311F108439D815E7291EB34E940CB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 846cf7da282c37925cf7b00193023d0a1898616d2eb26ea584e53bd6f967073c
                                                                          • Instruction ID: 1c5b78a54dc0bd21717696e789b1d0fe07d6f9f4255a8d56711329587a013006
                                                                          • Opcode Fuzzy Hash: 846cf7da282c37925cf7b00193023d0a1898616d2eb26ea584e53bd6f967073c
                                                                          • Instruction Fuzzy Hash: BC318BB6A00209AFCB10CFA9D844ADEBFF5EF48320F10846AE804E7391C7359954CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: bec348c5e555ff38c0b39fc2ef3b2a09572ee0568c6d3cb752a6b45959d7559a
                                                                          • Instruction ID: 29343e2bc2a630558fbe1d09b80d5ca2fc2dc0a328700f123a348363a0ca91ae
                                                                          • Opcode Fuzzy Hash: bec348c5e555ff38c0b39fc2ef3b2a09572ee0568c6d3cb752a6b45959d7559a
                                                                          • Instruction Fuzzy Hash: 8F31B3B8E0424ADFDB41CFADD5456EEBBF4AB09200F1490AAD814F3341E7749A40CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4ebbf2751c084cd4ff994f99b578c6d1f8882a40035c997c7a8e633ca402eaf3
                                                                          • Instruction ID: c9c0b599691d258d5a4674b42eda4d43e1977a7f1e130af7b1387b2c8629dc19
                                                                          • Opcode Fuzzy Hash: 4ebbf2751c084cd4ff994f99b578c6d1f8882a40035c997c7a8e633ca402eaf3
                                                                          • Instruction Fuzzy Hash: 7721D7B99083955FD702EF7C98501EE7FB3EFC5260B19446AD094DB292DB348A09C7A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 749f42b3ac41fec87641d9652f6a91d1d9e3b97b377306609cef261d423ee7e5
                                                                          • Instruction ID: 06c7097c8aadb23f539f05484267632e0c2f8d1af1f0b7deae7a48c4a845009f
                                                                          • Opcode Fuzzy Hash: 749f42b3ac41fec87641d9652f6a91d1d9e3b97b377306609cef261d423ee7e5
                                                                          • Instruction Fuzzy Hash: 7F216A71100200EFDB04DF04E9C0B57BF66FB98314F24C169E8090B256C736E886C7B2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ef8a51cec4927e65abf2a0c6bc6bc3a05588f3278738e1a55657df39d4da1854
                                                                          • Instruction ID: 4221c544231b0c6f91771d43fdbf5dca453f2be8de00fa9f04c850459d7df308
                                                                          • Opcode Fuzzy Hash: ef8a51cec4927e65abf2a0c6bc6bc3a05588f3278738e1a55657df39d4da1854
                                                                          • Instruction Fuzzy Hash: CC212571504240EFEB05DF14E9C0B67BF67FB98318F24C569E8490B256C736D896CAB1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725159663.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_24dd000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 20ef5b4756c825f3f26b8130c290c051f79b623e0ea1d4e2811ceebe9b793a3d
                                                                          • Instruction ID: 6d9d31561a0cdb1d2e5d6288008723f2a98ae5764eec5580842da9ecaff0cabe
                                                                          • Opcode Fuzzy Hash: 20ef5b4756c825f3f26b8130c290c051f79b623e0ea1d4e2811ceebe9b793a3d
                                                                          • Instruction Fuzzy Hash: 3B21F272A04200DFDB16DF24D994B26BBA5EBC8318F64C56AD90A4B356C33AD447CA61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725159663.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_24dd000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e73414ed5840e7312521e00beff52b92a660eb867d8219100d81a3f965b798b1
                                                                          • Instruction ID: 952e0bed66a860db13dc05cfc2af4151937a0f8730375cf105a408ea409b02c5
                                                                          • Opcode Fuzzy Hash: e73414ed5840e7312521e00beff52b92a660eb867d8219100d81a3f965b798b1
                                                                          • Instruction Fuzzy Hash: 48212672A44200EFDB05DF14D9D4B26BBA5FB88314F20C66EE8494F356C336D446CA61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 717d3417c6d5852943be1a0080daa5dc17db78df7f6a5f847f887ac7e7b0399f
                                                                          • Instruction ID: 7a90f5faf44dc4bb60ff2f9dba3cbc9853cb672169674be720d6513569fd6d35
                                                                          • Opcode Fuzzy Hash: 717d3417c6d5852943be1a0080daa5dc17db78df7f6a5f847f887ac7e7b0399f
                                                                          • Instruction Fuzzy Hash: 6331F2B4C01358EFDB21CF99C988BCEBFF5AB08314F14841AE458BB290C7759885CB95
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0aad4e0b909c3e50c9990099333e35b677ea9cfa4c75ebb97f83b5fbe5d0ae1d
                                                                          • Instruction ID: c3fd17eb168c8f3c258e158e48984b51b5b22e2c89369b73a9e90a365ac2e0dc
                                                                          • Opcode Fuzzy Hash: 0aad4e0b909c3e50c9990099333e35b677ea9cfa4c75ebb97f83b5fbe5d0ae1d
                                                                          • Instruction Fuzzy Hash: 6931F2B4C04218EFDB20DF9AC588B8EBFF5EB08314F248019E418BB290C7B59845CFA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 198f278a318ceb743c00c96fb8e2eb3ddd6ea5687295f93b893baaa3b89a683d
                                                                          • Instruction ID: bcec94055364a5e4500382a760ceaf1f08f9507a38e6b3ea54fdd21e65a6f5fb
                                                                          • Opcode Fuzzy Hash: 198f278a318ceb743c00c96fb8e2eb3ddd6ea5687295f93b893baaa3b89a683d
                                                                          • Instruction Fuzzy Hash: 6F118274A0D385AFCB07DB7489254AD7FF59F42210B1844D7D845CB293DA398D1AC752
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725159663.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_24dd000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0773a822291860bd057739c28979c0bf85d194cb0ba94588846dba2d7eb7b8e4
                                                                          • Instruction ID: 5475282e7fdda12279bb650dbab60f753d047a8aa613b9c6606d7b2ec6c6c410
                                                                          • Opcode Fuzzy Hash: 0773a822291860bd057739c28979c0bf85d194cb0ba94588846dba2d7eb7b8e4
                                                                          • Instruction Fuzzy Hash: CF216075508380DFCB06CF24D994712BF71EB86214F28C5DAD8498F2A6C33A980ACB62
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0a6e72c9e6c04f8df4ca275932ff38eeffd48952b510f091f07a8c2a2b3bbcf6
                                                                          • Instruction ID: 3323d78aff246e6491590c1f8f2e9e7548960ceb3d00c9064e8a1dce29e1886f
                                                                          • Opcode Fuzzy Hash: 0a6e72c9e6c04f8df4ca275932ff38eeffd48952b510f091f07a8c2a2b3bbcf6
                                                                          • Instruction Fuzzy Hash: A12103B5D146589BEB18CFABC8057EEFABABFC9300F04C02AD40966294DBB40945CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction ID: a7c7e23eecc2e78060e2c8d82c1b25ad5c19f8d9f77cc12cd167fabf05f0dcca
                                                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction Fuzzy Hash: A2112672504240DFCB16CF00D5C4B56BF72FB94324F28C6A9DC090B256C33AE85ACBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction ID: 85f3ac5301fe0f651bc2f77a1264cf629ede89d918c51247bcf3c9ad3cb316cb
                                                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction Fuzzy Hash: 17110372504280DFDB06CF10D5C4B56BF72FB94318F28C6A9D8090B256C336D85ACBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d5dc35cef15b2808fac021b36b1384264945b299198f207a46736a67281866c4
                                                                          • Instruction ID: d6fc7d32fc8799d6c19ca4bbf4cb85d4a5be7c4ec368909637380a63c2e1f2eb
                                                                          • Opcode Fuzzy Hash: d5dc35cef15b2808fac021b36b1384264945b299198f207a46736a67281866c4
                                                                          • Instruction Fuzzy Hash: BB2103B5900349AFCB20CF9AD944ADEBBF4FB48310F108429E919A7250C374AA54CFA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725159663.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_24dd000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                          • Instruction ID: e5b1fa05e3c7c2af495030f85f7f5dcd84794212bbca9fa211fe34b57ca447c3
                                                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                          • Instruction Fuzzy Hash: 63118B76904280DFDB16CF14D5D4B16BBB1FB84218F24C6AAD8494F796C33AD44ACB61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 35762c30145383bdacccb6df80ea97e5e880541ca4c94e52fbd56e4d679d3a8e
                                                                          • Instruction ID: 89c5c006e6db034084f49f54937dd0ff978b536be9b2d0361f1200c1b24e4028
                                                                          • Opcode Fuzzy Hash: 35762c30145383bdacccb6df80ea97e5e880541ca4c94e52fbd56e4d679d3a8e
                                                                          • Instruction Fuzzy Hash: FD01A771108340AAE7204A25ED847A7FF99EF51324F2CC92AED4A4A2C6CB79DC80C671
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 331a3a9720d872b4736e2683ada4b541235ce13733d403b2dcf9876dc914f75f
                                                                          • Instruction ID: c42f9658cfa4d141a946248aadbd3a8013ef696aa432eb2618a3adb5d1aad06f
                                                                          • Opcode Fuzzy Hash: 331a3a9720d872b4736e2683ada4b541235ce13733d403b2dcf9876dc914f75f
                                                                          • Instruction Fuzzy Hash: 61011BB8E0520AAFCB05DFB8D4452AEBBF4FB49300F1485AAD414E3642E7349A04CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8802817e2d028b5bab240bd22fca4a441724297ef0215e3e0650c261db2c4f85
                                                                          • Instruction ID: be29fec622da018efb574a420cd3d02744a67dddb464b0cf8a0dd99d180a9d02
                                                                          • Opcode Fuzzy Hash: 8802817e2d028b5bab240bd22fca4a441724297ef0215e3e0650c261db2c4f85
                                                                          • Instruction Fuzzy Hash: 7C016DB8E08209AFDB02DFB8D4016AEBBF4EF46304F1085AAD854E3381DB359A05CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 19aa7594f901daaf0e105955aa647ce66ad50f958c88b49f1671b94c78899843
                                                                          • Instruction ID: f943c182cf161a26e9a40519c7b1c1c6779913722dac41dc1f37fb9bc66b3507
                                                                          • Opcode Fuzzy Hash: 19aa7594f901daaf0e105955aa647ce66ad50f958c88b49f1671b94c78899843
                                                                          • Instruction Fuzzy Hash: 0201FBB8D09249EFCB05CFA9D9411AEBBF8BB49300F1181A6D854E3251E7749A05CB61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: db76b715c2f209648ae39e07d7de1c9487386f63a11b8b7183f027f9d2ccb8b1
                                                                          • Instruction ID: 964584446bfa786ae018e80526db71f2dcb9055bd123aecc35a8a5f94b686e86
                                                                          • Opcode Fuzzy Hash: db76b715c2f209648ae39e07d7de1c9487386f63a11b8b7183f027f9d2ccb8b1
                                                                          • Instruction Fuzzy Hash: FDF081B891C105EBC708CF65C5019FDBBBCAB4B700F05E9A4900A9B292E7309E40DBE0
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a68cfebf9fd1783a43623b0075e62df92d8d0864de86667ca0d05c5d7473de62
                                                                          • Instruction ID: f90a91a4b514cc493b0c7f7f25a28e290d66250b1219a40aed4f9aaa938ff324
                                                                          • Opcode Fuzzy Hash: a68cfebf9fd1783a43623b0075e62df92d8d0864de86667ca0d05c5d7473de62
                                                                          • Instruction Fuzzy Hash: C80121B4E05209EFD745DFA8D8016AEFBF5FB49300F1084AA9818E7345EB349E05CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9e06afe92fa7353154d3e7c997aa902595f9ed2b673e0a478fa93ed0ad1abba2
                                                                          • Instruction ID: b35d8fd74ed3e86b78b41220e1a4cb0cdf848da13f1dcb01267b9f76f3631891
                                                                          • Opcode Fuzzy Hash: 9e06afe92fa7353154d3e7c997aa902595f9ed2b673e0a478fa93ed0ad1abba2
                                                                          • Instruction Fuzzy Hash: 7B01FBF8E04209EFDB45DFA8D9416AEFBF5FB49300F1084A99818E7341EB319A01CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 225b9bbb3c32a776a8a2ba35a8b1e094e5b19bd163b7867ee1aff62fa92c9961
                                                                          • Instruction ID: f6f23bbe85b497bb4ca01d249c2b76d62e453e69eda20823d84ca05bf74a4daa
                                                                          • Opcode Fuzzy Hash: 225b9bbb3c32a776a8a2ba35a8b1e094e5b19bd163b7867ee1aff62fa92c9961
                                                                          • Instruction Fuzzy Hash: C50119B8D0934AEFCB02DFB898012ADBFF4AB0A304F0494A6D454E3242E7349A45CB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0ca95f4d5948e64a26b161333cee1633531c9a195b2dedda6137e5b73a631772
                                                                          • Instruction ID: 43390a70079d01e51cde49845873d8ba75bbcb6976ab8b51e138d70c0bc10d0c
                                                                          • Opcode Fuzzy Hash: 0ca95f4d5948e64a26b161333cee1633531c9a195b2dedda6137e5b73a631772
                                                                          • Instruction Fuzzy Hash: 550131B4D0524BAFC741DFB8D9011AEBFF5AB45300F1584A6D454E3242D7705B41CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e250a5d06789c3393d8d1a0cba612aa466e830a0e6127d326e28a95338e5227e
                                                                          • Instruction ID: 89333bd2bdcce32793078dbfcef99e90381f93c157fa7699e191ae25787df050
                                                                          • Opcode Fuzzy Hash: e250a5d06789c3393d8d1a0cba612aa466e830a0e6127d326e28a95338e5227e
                                                                          • Instruction Fuzzy Hash: B40119B8D09249EFCB42DFB9D8416ADBFF5AB4A300F4485AAD464E3252E7349A40DB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3181e43a450cab2345eadbaeb45587898c1a7ae67313ef9e126a5f490c1d47a3
                                                                          • Instruction ID: f592d1cf8b268900213a11042cc336019f1b59b3cc1f49e7a6cbda2c96424f3b
                                                                          • Opcode Fuzzy Hash: 3181e43a450cab2345eadbaeb45587898c1a7ae67313ef9e126a5f490c1d47a3
                                                                          • Instruction Fuzzy Hash: C1F0BB72508249BFCB05DB64DC4189E7FBADF05120715C0ABE444DB253D731A9508761
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1724970879.0000000000D1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D1D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_d1d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ce31767ca7dc6ab55013a08b5d984a7b5b6ed0acf04de0cfcfbe2f16d3ce169a
                                                                          • Instruction ID: d7dca6afdd58397f4883259b54e9df942351fdf30c280015269df6358fbb956d
                                                                          • Opcode Fuzzy Hash: ce31767ca7dc6ab55013a08b5d984a7b5b6ed0acf04de0cfcfbe2f16d3ce169a
                                                                          • Instruction Fuzzy Hash: ADF06871408344AEE7208A16DC847A2FFA8EF51724F18C55AED095A286C7759C44CA71
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 793d9cfc40ca8dacb02bab121ade14a778da34650711a5e9866a0bdc6bf806b5
                                                                          • Instruction ID: 7d24f7aea58b69afd6f28ad59e2a936e4cd03ec8ce20e4883c4a20f96aa514b1
                                                                          • Opcode Fuzzy Hash: 793d9cfc40ca8dacb02bab121ade14a778da34650711a5e9866a0bdc6bf806b5
                                                                          • Instruction Fuzzy Hash: 79F054B4D49349AFCB42DFB8D44569DBFF4AF0A300F1485EAD848E3242E7345A04CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1f1a042e88586ac11cef83670aeb173f57127bb6e99e7fef417ce35e1c2a4df4
                                                                          • Instruction ID: e400f76152957cd59ccab1d6b6d04233507271039aac53215fa31323f7ae09a8
                                                                          • Opcode Fuzzy Hash: 1f1a042e88586ac11cef83670aeb173f57127bb6e99e7fef417ce35e1c2a4df4
                                                                          • Instruction Fuzzy Hash: 21F0C8B8905209EFEB14DB59E84679CB7B9BB45300F00C1A5D005A32C4DB759689CF00
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0cc2d1e9d14f62bbd5135dd19a9922a4b5f60775f93db30e31d79acbeb87e75c
                                                                          • Instruction ID: e4ecf12e81205ff07a8dfa95d483c2e7b4736f27e7938875adbec4d989887e6c
                                                                          • Opcode Fuzzy Hash: 0cc2d1e9d14f62bbd5135dd19a9922a4b5f60775f93db30e31d79acbeb87e75c
                                                                          • Instruction Fuzzy Hash: FFF0DAB4D5420AEFDB44DFA9C841AAEBBF4FB48200F1085AAD918E7340D77495048FE1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a589cd0be4afdb5afa8e5a4c1442dfb1bce6d968eb5b3898e4e712a3266eb026
                                                                          • Instruction ID: 888c083c4ac233a8d710ea1720724e31d10835498fcdf400a0063a36cbd0f675
                                                                          • Opcode Fuzzy Hash: a589cd0be4afdb5afa8e5a4c1442dfb1bce6d968eb5b3898e4e712a3266eb026
                                                                          • Instruction Fuzzy Hash: 07E08CB6D0422AAB8B11AFA99C054EFFF7AAF06610B414512E89167A01D3700BA5CBD2
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 61a4d1e63692f6346f9510ff4d44d5d3d6ce2de0d0972c0a0e7a3062c414a2c6
                                                                          • Instruction ID: 68afba208d90f38dbc498b86268809f24116f0ebc90b92d3ddc883d1f69be0f7
                                                                          • Opcode Fuzzy Hash: 61a4d1e63692f6346f9510ff4d44d5d3d6ce2de0d0972c0a0e7a3062c414a2c6
                                                                          • Instruction Fuzzy Hash: EDF015B8E00208FBCB41EFA9E4056CCFBB9EB48301F10C0AAA818A2340DA346A50DF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ceba8754e153eefb868b65b73e9883120f797e80ab33bbf5a7ac0f631eac8002
                                                                          • Instruction ID: a55c2ffe8c0bd4b93cc4e6786f9c1537daeec5053c6ed515954f60292e7fe1b1
                                                                          • Opcode Fuzzy Hash: ceba8754e153eefb868b65b73e9883120f797e80ab33bbf5a7ac0f631eac8002
                                                                          • Instruction Fuzzy Hash: 52D0A5B24953655FD30727D675072E57F6C4F03311F445553F0CCD109745681699CF56
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 3c3466afa0d8a9b543c42e5b217969a1017e1c09e632299c099708f135231bb4
                                                                          • Instruction ID: 88883ae103b99266bf91efc8257ae2e9cb118f192ea6b3fc78ba73c56c03186f
                                                                          • Opcode Fuzzy Hash: 3c3466afa0d8a9b543c42e5b217969a1017e1c09e632299c099708f135231bb4
                                                                          • Instruction Fuzzy Hash: 6BE0C2B890114DFBCB04EFB8D4046AD7BF8AB05300F5085A8D805A3380DBB81E44D792
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7eb62ae04fe19ac0311745288b56bb44f791ed6a9fb14e0aec0717e76d56cf9e
                                                                          • Instruction ID: b56e7b3fc87f3984dfcebe9e6cbd05c0fda34e23b72d180992178ff434ca5af5
                                                                          • Opcode Fuzzy Hash: 7eb62ae04fe19ac0311745288b56bb44f791ed6a9fb14e0aec0717e76d56cf9e
                                                                          • Instruction Fuzzy Hash: 66E0B6B4D50209EFD744EFBDCA09A9EBBF4BF08600F11C5A9D019E7256E7B496048F91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 35b72de94dc9ec5f796c34b6e5eaa2afe4986bb8c660e799b043c139d8fcafb1
                                                                          • Instruction ID: d61050ae8ddd274fc0e74362177bbfa984d3bac86f5aff80878abf19e7826a30
                                                                          • Opcode Fuzzy Hash: 35b72de94dc9ec5f796c34b6e5eaa2afe4986bb8c660e799b043c139d8fcafb1
                                                                          • Instruction Fuzzy Hash: B7E0B6B8D042089FDB08DFE8E4451ACBBF6FF49300F10A419D45AAB385DB305802CF20
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 779e156979dfc428cf0bc998d240cf3c60e1e4f778246b5257d28c5337fd5691
                                                                          • Instruction ID: b2b3b199d89f1210336d5b475685cf61f74ea128e8f6b4032ea55aacfc6d7f8e
                                                                          • Opcode Fuzzy Hash: 779e156979dfc428cf0bc998d240cf3c60e1e4f778246b5257d28c5337fd5691
                                                                          • Instruction Fuzzy Hash: B0E017B4D15209EFDB81EFB9E94A69DBBF8AB04301F1090A9D808A3340EB706A40CB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                          • Instruction ID: e4d4d0d29aed3dd64c6aa69d49be03ba5aa36083c94d71db7258569c552df4b9
                                                                          • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                          • Instruction Fuzzy Hash: 82D09EB6D04139A78B10AFE9DC054DFFF79EF05A50F418126E915A7100D3715A21DBD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0406a8f72a1c1f9e0c1ca8f5e8ff46720fb8ea5d1a16c53ed5c64d6bb81e6b88
                                                                          • Instruction ID: ecb3c9fc22e3fc9f9fd07a66e393f9e4f1210561bb83738e0f16b427917fa96c
                                                                          • Opcode Fuzzy Hash: 0406a8f72a1c1f9e0c1ca8f5e8ff46720fb8ea5d1a16c53ed5c64d6bb81e6b88
                                                                          • Instruction Fuzzy Hash: 67D0A92500A7C1AED303A3208908858BFB6AEA250139A84C3D8C0CA833C6184828D362
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 47e9a7587e68c26de2f047d186163647c4fa08a656d496a4030448612f028e6d
                                                                          • Instruction ID: 0a92bcec3fc880155009b4413add1da91235e9cf5544d859da3913182195165e
                                                                          • Opcode Fuzzy Hash: 47e9a7587e68c26de2f047d186163647c4fa08a656d496a4030448612f028e6d
                                                                          • Instruction Fuzzy Hash: E1D0523AA46208CFDB10CB08EA41AE8B7BAEF85211F0091E5C00D92254D7302E888F11
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2823f01949842d8b03fdfedd4293a28cd535b869657dca80affcf53628475162
                                                                          • Instruction ID: ab624e1692b9d981e9a37adbdde2dfe9a5d52a3c6605b754e4c16f1265fed314
                                                                          • Opcode Fuzzy Hash: 2823f01949842d8b03fdfedd4293a28cd535b869657dca80affcf53628475162
                                                                          • Instruction Fuzzy Hash: 78D0127A240208AE8B51EE95E800D527BDCFB54640700C432E508CB021E721E438E791
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d8ee78b6592a4ffc3110d332c4237e90625d06e1629e73b806bf8dc8853f4f1f
                                                                          • Instruction ID: 5df3bd043431a8d3f2d90ded44fe5662c353bcf4a5462668d04989155579ccdd
                                                                          • Opcode Fuzzy Hash: d8ee78b6592a4ffc3110d332c4237e90625d06e1629e73b806bf8dc8853f4f1f
                                                                          • Instruction Fuzzy Hash: 18C08CB004070697D3022BD6BA0F3A4B7AC5B01302F44A020A00C604924BB82860CBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8eb558d6c01e3a750170eac87da10636827f20c542e6f1b73674167b22b5e319
                                                                          • Instruction ID: a9c31193610d887de68ca87e22bc6c73106ffa7f0eb3024cc96b4e2b54b8e00f
                                                                          • Opcode Fuzzy Hash: 8eb558d6c01e3a750170eac87da10636827f20c542e6f1b73674167b22b5e319
                                                                          • Instruction Fuzzy Hash: 71B012B9048381F4C70192708A40E9DAF635B65764FA84003E6C4100478375007BD317
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1728838296.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_4cc0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9cec7fc6ae75c50fc2049591cce6a0d63bc7d726123387f7bab05470051269e9
                                                                          • Instruction ID: c5449a90c03e6a2b1f02e0533b2ffcc9ea3e2066f3bef90eee375e376249ff35
                                                                          • Opcode Fuzzy Hash: 9cec7fc6ae75c50fc2049591cce6a0d63bc7d726123387f7bab05470051269e9
                                                                          • Instruction Fuzzy Hash: 5F1295B0C827458AD330EF65E84C1893BB1BB45319BD04E19D2619F2E1E7B8126EEF5D
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c35a6838352aff8d981b164d59de2113be43d8a4078ea52ae4b2e1d95b3c8090
                                                                          • Instruction ID: e19d10d03c5dc425d461812d5424928354397cddf93982693974ce37053522d7
                                                                          • Opcode Fuzzy Hash: c35a6838352aff8d981b164d59de2113be43d8a4078ea52ae4b2e1d95b3c8090
                                                                          • Instruction Fuzzy Hash: F4E1FAB4E001599FCB14DFA9C5809AEFBF6BF89305F24C169E415AB356DB30A942CF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fbd724dd309da4298e9a046f1e36345ac340dc67b3773abf9c488c5e7e236867
                                                                          • Instruction ID: 038c012ac801e2b0727d35149a3cd413cfb419e5b78cd8dbeeb2d4eca36ca944
                                                                          • Opcode Fuzzy Hash: fbd724dd309da4298e9a046f1e36345ac340dc67b3773abf9c488c5e7e236867
                                                                          • Instruction Fuzzy Hash: 2AE1FCB4E002599FCB14DFA9C5809AEFBF6BF49305F24C169E419A7356DB30A942CF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 8d90788dc17096b5a05bd86721c6baefe8af66fd84db714ced856d0a6c33da82
                                                                          • Instruction ID: a437ad675b5cd5c677c17fbd63eb1e5c62f77d536bf4f0ce7f139eb4253b77b6
                                                                          • Opcode Fuzzy Hash: 8d90788dc17096b5a05bd86721c6baefe8af66fd84db714ced856d0a6c33da82
                                                                          • Instruction Fuzzy Hash: EFE1EBB4E00159CFCB18DFA9C5909AEFBF2BF89305F248159E815A7356DB31A981CF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731104649.0000000007150000.00000040.00000800.00020000.00000000.sdmp, Offset: 07150000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_7150000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d833dadc82870ebb1e6f9319aa26e3d47cc77679633e8d7a0451f0d200a2ab49
                                                                          • Instruction ID: 81d34b3b550d77c8f5e64b8a0ad26c49f8aabbc2f4747af2a2a0fa180e4e2cf3
                                                                          • Opcode Fuzzy Hash: d833dadc82870ebb1e6f9319aa26e3d47cc77679633e8d7a0451f0d200a2ab49
                                                                          • Instruction Fuzzy Hash: F6E1DAB4E00159CFCB18DFA9C5809AEFBF2BF89305F248169E815A7356DB31A941CF61
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 681555f5a7c9f45c31297ab9c682bc047c1a2c1bc4ed20e3c98020e747fb891b
                                                                          • Instruction ID: f907722e434c2ff4a6e4c6aa66f4640efc9c231d4df314f7a582286f06eb696b
                                                                          • Opcode Fuzzy Hash: 681555f5a7c9f45c31297ab9c682bc047c1a2c1bc4ed20e3c98020e747fb891b
                                                                          • Instruction Fuzzy Hash: FEE11635D2065A9ACB10EFA8D994ADDF7B1FF95300F10C79AE00937225EB706AC5CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac414b4dc3170bd6806c36a364521000cc94a915e31230a883d05f78909045d8
                                                                          • Instruction ID: de585de51425bb2d8c5cb1adaee593314444975e1476765f83a69d7230b1b8fa
                                                                          • Opcode Fuzzy Hash: ac414b4dc3170bd6806c36a364521000cc94a915e31230a883d05f78909045d8
                                                                          • Instruction Fuzzy Hash: FFD1F435D2065A9ACB00EFA8D994ADDB7B1FF95300F10C79AE40937225EF706AC5CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1725456278.0000000002560000.00000040.00000800.00020000.00000000.sdmp, Offset: 02560000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_2560000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ed63fad2caf8990572528ab102f2857db0ddeeb7d20feecf737962924f2833d9
                                                                          • Instruction ID: a0d6e31c6a1a5050a4ca3d288b53c4e92486c0f4ce6c268160a88209e07e9119
                                                                          • Opcode Fuzzy Hash: ed63fad2caf8990572528ab102f2857db0ddeeb7d20feecf737962924f2833d9
                                                                          • Instruction Fuzzy Hash: 59A17F32E00206CFCF15DFB4D8485AEBBB2FF85304B15856AE806AB265DB71E956CF44
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1728838296.0000000004CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04CC0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_4cc0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4e1b7f128341bc752782d136ab705ccd38a754c3f0381334cc8ac26a723226ef
                                                                          • Instruction ID: bd5cb5fb45fda1c8b8f1575f34ae6d0940e6798185480cdc7670208a1b2fac93
                                                                          • Opcode Fuzzy Hash: 4e1b7f128341bc752782d136ab705ccd38a754c3f0381334cc8ac26a723226ef
                                                                          • Instruction Fuzzy Hash: E7C12CB0C82705CBD730DF65E8481897BB1BB85315FE04E19D161AB2E0EBB4166EEF58
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1731169380.00000000071A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 071A0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_71a0000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 38aedf65e25faee093ef28d2120e990478b5c52295ea7c7189bcb9e7f319ae01
                                                                          • Instruction ID: c8d3bf97f8cd50a7cb69f7449627f645bcfbda4fb34861092937da7386442f7c
                                                                          • Opcode Fuzzy Hash: 38aedf65e25faee093ef28d2120e990478b5c52295ea7c7189bcb9e7f319ae01
                                                                          • Instruction Fuzzy Hash: 8F51F6B8E1960AEFCB08CFAAE4405EEFBF6BF8A300F159025E459B7659D7305941CB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1729562440.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5340000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 9bdf96561c4d68da428d0231891bd9441c149d94efed58d4c5af6150824ed97c
                                                                          • Instruction ID: 9633dcf4ec2e9d7d10301877f4edc4f33444bef33bd7797be14a84b978bd667e
                                                                          • Opcode Fuzzy Hash: 9bdf96561c4d68da428d0231891bd9441c149d94efed58d4c5af6150824ed97c
                                                                          • Instruction Fuzzy Hash: AF51FBB4E002099BDB04CFA9D980AAEBBF6FF88300F14C565E515E7255D734AA818F60
                                                                          Memory Dump Source
                                                                          • Source File: 00000000.00000002.1729562440.0000000005340000.00000040.00000800.00020000.00000000.sdmp, Offset: 05340000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_0_2_5340000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c17db2ceced469ec90082a13d055fc9f31587b2c01acf4b65358bcf206bbb386
                                                                          • Instruction ID: 57bcbbb7a739c0279d8eb4df0116b9fbe45e88b1b89d107e5af8b699e754f2ae
                                                                          • Opcode Fuzzy Hash: c17db2ceced469ec90082a13d055fc9f31587b2c01acf4b65358bcf206bbb386
                                                                          • Instruction Fuzzy Hash: 3D51DBB4E046099FDB04CFA9D880AAEBBF2FF88300F14C565E519E7255D734AA91CF64
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.4127637884.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_2f10000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 297905810ec28fc67cfc43d14ea150cd163e75128edf229e02dfcc40f29ed29f
                                                                          • Instruction ID: 2ffd71728ea2f56f730c01b19052271c0d1ab6ddcde9b9d48530200e13971519
                                                                          • Opcode Fuzzy Hash: 297905810ec28fc67cfc43d14ea150cd163e75128edf229e02dfcc40f29ed29f
                                                                          • Instruction Fuzzy Hash: 4F416632E003958FDB05DFB9D8002DEBBF1BF89350F14856AD508A7250EB389845CBD1
                                                                          APIs
                                                                          • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,02F18132), ref: 02F1821F
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.4127637884.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_2f10000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: GlobalMemoryStatus
                                                                          • String ID:
                                                                          • API String ID: 1890195054-0
                                                                          • Opcode ID: c6561e70ac0bfdc08b31f3bfaeb186b377323932608b2a0744768358b507febb
                                                                          • Instruction ID: 32301faa35f54d4313c4576e5e0c339b8fe2eb2b12748502ba710c83bd28d9d8
                                                                          • Opcode Fuzzy Hash: c6561e70ac0bfdc08b31f3bfaeb186b377323932608b2a0744768358b507febb
                                                                          • Instruction Fuzzy Hash: AD1100B2D006599FDB10DF9AC544BEEFBF4AB48364F10816AE918B7240D378A940CFE5
                                                                          APIs
                                                                          • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,02F18132), ref: 02F1821F
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.4127637884.0000000002F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_2f10000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID: GlobalMemoryStatus
                                                                          • String ID:
                                                                          • API String ID: 1890195054-0
                                                                          • Opcode ID: d5481c02d5e2c9e6b3166e4f197e099373867c31efff04d8352e7748657b0a33
                                                                          • Instruction ID: 1ae74d4ce5c5db60dd1b3dbdf67c1da66026801b61ee2ce42b6b123d754b8823
                                                                          • Opcode Fuzzy Hash: d5481c02d5e2c9e6b3166e4f197e099373867c31efff04d8352e7748657b0a33
                                                                          • Instruction Fuzzy Hash: F21133B6C006598BDB10CF9AC6447DEFBF4AB08364F20816AD818B7240D378A940CFA4
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.4127228806.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_158d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 101efad2a1c2cfb9b11272af6eb088eb5e12a3194160975841208d98ccfc0ccd
                                                                          • Instruction ID: 8ce11c8d93577f44173b24b36da3ad8337b39a6cd4c25df486e508fefb08e4f2
                                                                          • Opcode Fuzzy Hash: 101efad2a1c2cfb9b11272af6eb088eb5e12a3194160975841208d98ccfc0ccd
                                                                          • Instruction Fuzzy Hash: 35210371504204DFDB05EF98D9C0B2ABFF5FB98324F208569E90A5F296C336D456CAA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000008.00000002.4127228806.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_8_2_158d000_product sample requirement.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction ID: ed1148f0efe9c6ba314acf36fd46dbffb071acb0829e8a77b15d47666094d826
                                                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction Fuzzy Hash: AD11E172404240CFCB16DF44D9C4B1ABFB2FB84324F24C1A9D8090F256C336D45ACBA1

                                                                          Execution Graph

                                                                          Execution Coverage:10.5%
                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                          Signature Coverage:0%
                                                                          Total number of Nodes:161
                                                                          Total number of Limit Nodes:11
                                                                          execution_graph 29547 6dd1a2c 29551 6dd33d0 29547->29551 29568 6dd33e0 29547->29568 29548 6dd1a47 29552 6dd33e0 29551->29552 29553 6dd3402 29552->29553 29585 6dd3c3c 29552->29585 29592 6dd36c8 29552->29592 29597 6dd38ed 29552->29597 29602 6dd3fed 29552->29602 29610 6dd40d2 29552->29610 29615 6dd3d33 29552->29615 29620 6dd3a73 29552->29620 29625 6dd37f0 29552->29625 29630 6dd3f71 29552->29630 29635 6dd3bb4 29552->29635 29641 6dd3954 29552->29641 29648 6dd3cd8 29552->29648 29652 6dd39dc 29552->29652 29657 6dd41bc 29552->29657 29553->29548 29569 6dd33fa 29568->29569 29570 6dd3c3c 4 API calls 29569->29570 29571 6dd41bc 2 API calls 29569->29571 29572 6dd39dc 2 API calls 29569->29572 29573 6dd3cd8 2 API calls 29569->29573 29574 6dd3954 4 API calls 29569->29574 29575 6dd3bb4 2 API calls 29569->29575 29576 6dd3402 29569->29576 29577 6dd3f71 2 API calls 29569->29577 29578 6dd37f0 2 API calls 29569->29578 29579 6dd3a73 2 API calls 29569->29579 29580 6dd3d33 2 API calls 29569->29580 29581 6dd40d2 2 API calls 29569->29581 29582 6dd3fed 4 API calls 29569->29582 29583 6dd38ed 2 API calls 29569->29583 29584 6dd36c8 2 API calls 29569->29584 29570->29576 29571->29576 29572->29576 29573->29576 29574->29576 29575->29576 29576->29548 29577->29576 29578->29576 29579->29576 29580->29576 29581->29576 29582->29576 29583->29576 29584->29576 29670 6dd1148 29585->29670 29674 6dd1140 29585->29674 29586 6dd37e8 29586->29553 29587 6dd377b 29587->29586 29662 6dd13c4 29587->29662 29666 6dd13d0 29587->29666 29593 6dd36fb 29592->29593 29594 6dd37e8 29593->29594 29595 6dd13c4 CreateProcessA 29593->29595 29596 6dd13d0 CreateProcessA 29593->29596 29594->29553 29595->29593 29596->29593 29599 6dd377b 29597->29599 29598 6dd37e8 29598->29553 29599->29598 29600 6dd13c4 CreateProcessA 29599->29600 29601 6dd13d0 CreateProcessA 29599->29601 29600->29599 29601->29599 29603 6dd403a 29602->29603 29678 6dd0fa8 29603->29678 29682 6dd0fb0 29603->29682 29604 6dd37e8 29604->29553 29605 6dd377b 29605->29604 29608 6dd13c4 CreateProcessA 29605->29608 29609 6dd13d0 CreateProcessA 29605->29609 29608->29605 29609->29605 29612 6dd3c2e 29610->29612 29611 6dd42e9 29611->29553 29612->29611 29613 6dd1148 WriteProcessMemory 29612->29613 29614 6dd1140 WriteProcessMemory 29612->29614 29613->29612 29614->29612 29616 6dd3f8d 29615->29616 29617 6dd3faf 29616->29617 29686 6dd1238 29616->29686 29690 6dd1231 29616->29690 29621 6dd3a82 29620->29621 29623 6dd0fa8 Wow64SetThreadContext 29621->29623 29624 6dd0fb0 Wow64SetThreadContext 29621->29624 29622 6dd3a9d 29623->29622 29624->29622 29627 6dd377b 29625->29627 29626 6dd37e8 29626->29553 29627->29626 29628 6dd13c4 CreateProcessA 29627->29628 29629 6dd13d0 CreateProcessA 29627->29629 29628->29627 29629->29627 29631 6dd3f8c 29630->29631 29633 6dd1238 ReadProcessMemory 29631->29633 29634 6dd1231 ReadProcessMemory 29631->29634 29632 6dd3faf 29633->29632 29634->29632 29636 6dd39fc 29635->29636 29637 6dd3eff 29636->29637 29694 6dd0ef8 29636->29694 29698 6dd0f00 29636->29698 29637->29553 29638 6dd3a11 29638->29553 29702 6dd1088 29641->29702 29706 6dd1080 29641->29706 29642 6dd37e8 29642->29553 29643 6dd377b 29643->29642 29646 6dd13c4 CreateProcessA 29643->29646 29647 6dd13d0 CreateProcessA 29643->29647 29646->29643 29647->29643 29650 6dd1148 WriteProcessMemory 29648->29650 29651 6dd1140 WriteProcessMemory 29648->29651 29649 6dd3d06 29650->29649 29651->29649 29653 6dd39fc 29652->29653 29655 6dd0ef8 ResumeThread 29653->29655 29656 6dd0f00 ResumeThread 29653->29656 29654 6dd3a11 29654->29553 29655->29654 29656->29654 29658 6dd3c2e 29657->29658 29659 6dd42e9 29658->29659 29660 6dd1148 WriteProcessMemory 29658->29660 29661 6dd1140 WriteProcessMemory 29658->29661 29659->29553 29660->29658 29661->29658 29663 6dd1459 CreateProcessA 29662->29663 29665 6dd161b 29663->29665 29665->29665 29667 6dd1459 CreateProcessA 29666->29667 29669 6dd161b 29667->29669 29669->29669 29671 6dd1190 WriteProcessMemory 29670->29671 29673 6dd11e7 29671->29673 29673->29587 29675 6dd1190 WriteProcessMemory 29674->29675 29677 6dd11e7 29675->29677 29677->29587 29679 6dd0ff5 Wow64SetThreadContext 29678->29679 29681 6dd103d 29679->29681 29681->29605 29683 6dd0ff5 Wow64SetThreadContext 29682->29683 29685 6dd103d 29683->29685 29685->29605 29687 6dd1283 ReadProcessMemory 29686->29687 29689 6dd12c7 29687->29689 29689->29617 29691 6dd1283 ReadProcessMemory 29690->29691 29693 6dd12c7 29691->29693 29693->29617 29695 6dd0f40 ResumeThread 29694->29695 29697 6dd0f71 29695->29697 29697->29638 29699 6dd0f40 ResumeThread 29698->29699 29701 6dd0f71 29699->29701 29701->29638 29703 6dd10c8 VirtualAllocEx 29702->29703 29705 6dd1105 29703->29705 29705->29643 29707 6dd10c8 VirtualAllocEx 29706->29707 29709 6dd1105 29707->29709 29709->29643 29497 eb4668 29498 eb467a 29497->29498 29499 eb4686 29498->29499 29501 eb4789 29498->29501 29502 eb479d 29501->29502 29505 eb4888 29502->29505 29506 eb48af 29505->29506 29507 eb498c 29506->29507 29509 eb44b4 29506->29509 29510 eb5918 CreateActCtxA 29509->29510 29512 eb59db 29510->29512 29521 6dd45b8 29523 6dd45bc 29521->29523 29522 6dd4743 29523->29522 29526 6dd4838 PostMessageW 29523->29526 29528 6dd4831 29523->29528 29527 6dd48a4 29526->29527 29527->29523 29529 6dd4838 PostMessageW 29528->29529 29530 6dd48a4 29529->29530 29530->29523 29513 ebac70 29516 ebad68 29513->29516 29514 ebac7f 29517 ebad9c 29516->29517 29518 ebad79 29516->29518 29517->29514 29518->29517 29519 ebafa0 GetModuleHandleW 29518->29519 29520 ebafcd 29519->29520 29520->29514 29531 ebd000 29532 ebd046 29531->29532 29536 ebd5d9 29532->29536 29540 ebd5e8 29532->29540 29533 ebd133 29537 ebd5ec 29536->29537 29544 ebd23c 29537->29544 29541 ebd5ec 29540->29541 29542 ebd23c DuplicateHandle 29541->29542 29543 ebd616 29542->29543 29543->29533 29545 ebd650 DuplicateHandle 29544->29545 29546 ebd616 29545->29546 29546->29533
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: (o^q$4'^q$4'^q$4'^q$4'^q$4'^q$4'^q$4|cq$4|cq$$^q
                                                                          • API String ID: 0-2723476363
                                                                          • Opcode ID: 9ab0b73a3ffe03e0cd12d9f13b6c12b428647df42b49d4cd130704644634ed05
                                                                          • Instruction ID: 7c81227beb69521e6448f579b738c97e7307d99f1593ea82a9174738f58b4f18
                                                                          • Opcode Fuzzy Hash: 9ab0b73a3ffe03e0cd12d9f13b6c12b428647df42b49d4cd130704644634ed05
                                                                          • Instruction Fuzzy Hash: 13430874A00219CFCB64DF68C888A9DB7B2BF49314F159595E919AB3A1CB30EEC1DF50

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1033 6e134b8-6e134e0 1034 6e134e2 1033->1034 1035 6e134e7-6e135a3 1033->1035 1034->1035 1038 6e135a5-6e135cb 1035->1038 1039 6e135a8-6e135b5 1035->1039 1041 6e135d1-6e135fb 1038->1041 1042 6e13abb-6e13afd 1038->1042 1039->1038 1045 6e13601-6e13619 1041->1045 1046 6e13cc8-6e13cd4 1041->1046 1051 6e13b00-6e13b04 1042->1051 1047 6e13cda-6e13ce3 1045->1047 1048 6e1361f-6e13620 1045->1048 1046->1047 1054 6e13ce9-6e13cf5 1047->1054 1050 6e13cae-6e13cba 1048->1050 1052 6e13cc0-6e13cc7 1050->1052 1053 6e13625-6e13631 1050->1053 1055 6e136d6-6e136da 1051->1055 1056 6e13b0a-6e13b10 1051->1056 1059 6e13633 1053->1059 1060 6e13638-6e13653 1053->1060 1065 6e13cfb-6e13d07 1054->1065 1057 6e136ec-6e136f2 1055->1057 1058 6e136dc-6e136ea 1055->1058 1056->1042 1061 6e13b12-6e13b6d 1056->1061 1063 6e13737-6e1373b 1057->1063 1062 6e1374a-6e1377c 1058->1062 1059->1060 1060->1054 1064 6e13659-6e1367e 1060->1064 1080 6e13ba4-6e13bce 1061->1080 1081 6e13b6f-6e13ba2 1061->1081 1086 6e137a6 1062->1086 1087 6e1377e-6e1378a 1062->1087 1066 6e136f4-6e13700 1063->1066 1067 6e1373d 1063->1067 1064->1065 1078 6e13684-6e13686 1064->1078 1074 6e13d0d-6e13d14 1065->1074 1070 6e13702 1066->1070 1071 6e13707-6e1370f 1066->1071 1073 6e13740-6e13744 1067->1073 1070->1071 1076 6e13711-6e13725 1071->1076 1077 6e13734 1071->1077 1073->1062 1079 6e136bc-6e136d3 1073->1079 1083 6e13689-6e13694 1076->1083 1084 6e1372b-6e13732 1076->1084 1077->1063 1078->1083 1079->1055 1094 6e13bd7-6e13c56 1080->1094 1081->1094 1083->1074 1088 6e1369a-6e136b7 1083->1088 1084->1067 1093 6e137ac-6e137d9 1086->1093 1090 6e13794-6e1379a 1087->1090 1091 6e1378c-6e13792 1087->1091 1088->1073 1095 6e137a4 1090->1095 1091->1095 1100 6e13828-6e138bb 1093->1100 1101 6e137db-6e13813 1093->1101 1108 6e13c5d-6e13c70 1094->1108 1095->1093 1116 6e138c4-6e138c5 1100->1116 1117 6e138bd 1100->1117 1109 6e13c7f-6e13c84 1101->1109 1108->1109 1110 6e13c86-6e13c94 1109->1110 1111 6e13c9b-6e13cab 1109->1111 1110->1111 1111->1050 1118 6e13916-6e1391c 1116->1118 1117->1116 1119 6e138c7-6e138e6 1118->1119 1120 6e1391e-6e139e0 1118->1120 1121 6e138e8 1119->1121 1122 6e138ed-6e13913 1119->1122 1131 6e13a21-6e13a25 1120->1131 1132 6e139e2-6e13a1b 1120->1132 1121->1122 1122->1118 1133 6e13a27-6e13a60 1131->1133 1134 6e13a66-6e13a6a 1131->1134 1132->1131 1133->1134 1135 6e13aab-6e13aaf 1134->1135 1136 6e13a6c-6e13aa5 1134->1136 1135->1061 1138 6e13ab1-6e13ab9 1135->1138 1136->1135 1138->1051
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 4'^q$:$pbq$~
                                                                          • API String ID: 0-999388165
                                                                          • Opcode ID: 398674d31ab542ffee6fb0f21ba43a5eabd986e914f7c3c2b7582533fcc32338
                                                                          • Instruction ID: 92f4b8a8a4a3b6a03dc9e1b97133e5597f941235a524ddaa0fb3a982bcc97850
                                                                          • Opcode Fuzzy Hash: 398674d31ab542ffee6fb0f21ba43a5eabd986e914f7c3c2b7582533fcc32338
                                                                          • Instruction Fuzzy Hash: 9942F175E00228DFDB55CFA8C980B99BBB2FF88304F1590E9E509AB261D731AD91DF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7233e88601e0b723ba51f02d89cf29700b641c685e0cae77e8bd011c6619019c
                                                                          • Instruction ID: 92116b1bf3835bdf1af897c257bb9433ea761c6056da766e5196a2c886028292
                                                                          • Opcode Fuzzy Hash: 7233e88601e0b723ba51f02d89cf29700b641c685e0cae77e8bd011c6619019c
                                                                          • Instruction Fuzzy Hash: AF112EB1D017089BEB18DF6BDC053AEBBF7AFC9300F18D0799418AA264DB7405469F41

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1239 6dd13c4-6dd1465 1241 6dd149e-6dd14be 1239->1241 1242 6dd1467-6dd1471 1239->1242 1247 6dd14f7-6dd1526 1241->1247 1248 6dd14c0-6dd14ca 1241->1248 1242->1241 1243 6dd1473-6dd1475 1242->1243 1245 6dd1498-6dd149b 1243->1245 1246 6dd1477-6dd1481 1243->1246 1245->1241 1249 6dd1485-6dd1494 1246->1249 1250 6dd1483 1246->1250 1258 6dd155f-6dd1619 CreateProcessA 1247->1258 1259 6dd1528-6dd1532 1247->1259 1248->1247 1251 6dd14cc-6dd14ce 1248->1251 1249->1249 1252 6dd1496 1249->1252 1250->1249 1253 6dd14f1-6dd14f4 1251->1253 1254 6dd14d0-6dd14da 1251->1254 1252->1245 1253->1247 1256 6dd14dc 1254->1256 1257 6dd14de-6dd14ed 1254->1257 1256->1257 1257->1257 1260 6dd14ef 1257->1260 1270 6dd161b-6dd1621 1258->1270 1271 6dd1622-6dd16a8 1258->1271 1259->1258 1261 6dd1534-6dd1536 1259->1261 1260->1253 1263 6dd1559-6dd155c 1261->1263 1264 6dd1538-6dd1542 1261->1264 1263->1258 1265 6dd1544 1264->1265 1266 6dd1546-6dd1555 1264->1266 1265->1266 1266->1266 1267 6dd1557 1266->1267 1267->1263 1270->1271 1281 6dd16b8-6dd16bc 1271->1281 1282 6dd16aa-6dd16ae 1271->1282 1284 6dd16cc-6dd16d0 1281->1284 1285 6dd16be-6dd16c2 1281->1285 1282->1281 1283 6dd16b0 1282->1283 1283->1281 1287 6dd16e0-6dd16e4 1284->1287 1288 6dd16d2-6dd16d6 1284->1288 1285->1284 1286 6dd16c4 1285->1286 1286->1284 1290 6dd16f6-6dd16fd 1287->1290 1291 6dd16e6-6dd16ec 1287->1291 1288->1287 1289 6dd16d8 1288->1289 1289->1287 1292 6dd16ff-6dd170e 1290->1292 1293 6dd1714 1290->1293 1291->1290 1292->1293 1295 6dd1715 1293->1295 1295->1295
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06DD1606
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: 4487260966a3713ddd19e5220ec93cc4a947d133ede2f823fabd5f56765ce378
                                                                          • Instruction ID: 66cfc94c018a5f05b15c89cf94e4d39e3e0cf6faf0d093ef40466e41f1a5d846
                                                                          • Opcode Fuzzy Hash: 4487260966a3713ddd19e5220ec93cc4a947d133ede2f823fabd5f56765ce378
                                                                          • Instruction Fuzzy Hash: 75913871D002199FDB50DFA8CD41BEEBBB2FF48314F1485AAE809A7290DB749985CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1296 6dd13d0-6dd1465 1298 6dd149e-6dd14be 1296->1298 1299 6dd1467-6dd1471 1296->1299 1304 6dd14f7-6dd1526 1298->1304 1305 6dd14c0-6dd14ca 1298->1305 1299->1298 1300 6dd1473-6dd1475 1299->1300 1302 6dd1498-6dd149b 1300->1302 1303 6dd1477-6dd1481 1300->1303 1302->1298 1306 6dd1485-6dd1494 1303->1306 1307 6dd1483 1303->1307 1315 6dd155f-6dd1619 CreateProcessA 1304->1315 1316 6dd1528-6dd1532 1304->1316 1305->1304 1308 6dd14cc-6dd14ce 1305->1308 1306->1306 1309 6dd1496 1306->1309 1307->1306 1310 6dd14f1-6dd14f4 1308->1310 1311 6dd14d0-6dd14da 1308->1311 1309->1302 1310->1304 1313 6dd14dc 1311->1313 1314 6dd14de-6dd14ed 1311->1314 1313->1314 1314->1314 1317 6dd14ef 1314->1317 1327 6dd161b-6dd1621 1315->1327 1328 6dd1622-6dd16a8 1315->1328 1316->1315 1318 6dd1534-6dd1536 1316->1318 1317->1310 1320 6dd1559-6dd155c 1318->1320 1321 6dd1538-6dd1542 1318->1321 1320->1315 1322 6dd1544 1321->1322 1323 6dd1546-6dd1555 1321->1323 1322->1323 1323->1323 1324 6dd1557 1323->1324 1324->1320 1327->1328 1338 6dd16b8-6dd16bc 1328->1338 1339 6dd16aa-6dd16ae 1328->1339 1341 6dd16cc-6dd16d0 1338->1341 1342 6dd16be-6dd16c2 1338->1342 1339->1338 1340 6dd16b0 1339->1340 1340->1338 1344 6dd16e0-6dd16e4 1341->1344 1345 6dd16d2-6dd16d6 1341->1345 1342->1341 1343 6dd16c4 1342->1343 1343->1341 1347 6dd16f6-6dd16fd 1344->1347 1348 6dd16e6-6dd16ec 1344->1348 1345->1344 1346 6dd16d8 1345->1346 1346->1344 1349 6dd16ff-6dd170e 1347->1349 1350 6dd1714 1347->1350 1348->1347 1349->1350 1352 6dd1715 1350->1352 1352->1352
                                                                          APIs
                                                                          • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 06DD1606
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: CreateProcess
                                                                          • String ID:
                                                                          • API String ID: 963392458-0
                                                                          • Opcode ID: b69e9c2ddb331852e0862d601798fe89a4648ff27e5515412eb96503b2ed6b83
                                                                          • Instruction ID: 403b99be1a40eb5f529fe2a47219cf6bc750c735fb6109e5fc6c805a62505dab
                                                                          • Opcode Fuzzy Hash: b69e9c2ddb331852e0862d601798fe89a4648ff27e5515412eb96503b2ed6b83
                                                                          • Instruction Fuzzy Hash: 15912971D002199FDB50DFA8CC41BEEBBB2FF48314F1485AAE849A7290DB749985CF91

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1353 ebad68-ebad77 1354 ebad79-ebad86 call eba08c 1353->1354 1355 ebada3-ebada7 1353->1355 1361 ebad88-ebad96 call ebb000 1354->1361 1362 ebad9c 1354->1362 1357 ebadbb-ebadfc 1355->1357 1358 ebada9-ebadb3 1355->1358 1364 ebae09-ebae17 1357->1364 1365 ebadfe-ebae06 1357->1365 1358->1357 1361->1362 1371 ebaed8-ebaf98 1361->1371 1362->1355 1366 ebae3b-ebae3d 1364->1366 1367 ebae19-ebae1e 1364->1367 1365->1364 1372 ebae40-ebae47 1366->1372 1369 ebae29 1367->1369 1370 ebae20-ebae27 call eba098 1367->1370 1374 ebae2b-ebae39 1369->1374 1370->1374 1403 ebaf9a-ebaf9d 1371->1403 1404 ebafa0-ebafcb GetModuleHandleW 1371->1404 1375 ebae49-ebae51 1372->1375 1376 ebae54-ebae5b 1372->1376 1374->1372 1375->1376 1379 ebae68-ebae71 call eba0a8 1376->1379 1380 ebae5d-ebae65 1376->1380 1384 ebae7e-ebae83 1379->1384 1385 ebae73-ebae7b 1379->1385 1380->1379 1386 ebaea1-ebaea5 1384->1386 1387 ebae85-ebae8c 1384->1387 1385->1384 1392 ebaeab-ebaeae 1386->1392 1387->1386 1389 ebae8e-ebae9e call eba0b8 call eba0c8 1387->1389 1389->1386 1394 ebaed1-ebaed7 1392->1394 1395 ebaeb0-ebaece 1392->1395 1395->1394 1403->1404 1405 ebafcd-ebafd3 1404->1405 1406 ebafd4-ebafe8 1404->1406 1405->1406
                                                                          APIs
                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EBAFBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: 3a7cf24ba2dcf277b5d8349a182f0c15042b130074d4c1e1a071a8fc26d3fdbe
                                                                          • Instruction ID: a8f2cf001337b59d9255daff3bbf6fbe39f9b640e1d68939e507c33988368698
                                                                          • Opcode Fuzzy Hash: 3a7cf24ba2dcf277b5d8349a182f0c15042b130074d4c1e1a071a8fc26d3fdbe
                                                                          • Instruction Fuzzy Hash: C2711370A00B058FDB24DF69D05179BBBF1BF88304F148A2ED48AE7A50D775E949CB92

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1409 eb44b4-eb59d9 CreateActCtxA 1413 eb59db-eb59e1 1409->1413 1414 eb59e2-eb5a3c 1409->1414 1413->1414 1421 eb5a4b-eb5a4f 1414->1421 1422 eb5a3e-eb5a41 1414->1422 1423 eb5a51-eb5a5d 1421->1423 1424 eb5a60 1421->1424 1422->1421 1423->1424 1426 eb5a61 1424->1426 1426->1426
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 00EB59C9
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: cb2a087b95f95f3272649d7ba5c961af335f8589f7f11c7ee2a8a883a80d36f2
                                                                          • Instruction ID: 45785550fbd607a6d48e9719e50f3cac6de48ee4c244d3e0dd81acd34fc3f71b
                                                                          • Opcode Fuzzy Hash: cb2a087b95f95f3272649d7ba5c961af335f8589f7f11c7ee2a8a883a80d36f2
                                                                          • Instruction Fuzzy Hash: A141E0B1C00619CBDB24DFA9C884BDEBBB5BF88304F20806AD408BB251DB756945CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1427 eb5916 1428 eb591c-eb59d9 CreateActCtxA 1427->1428 1430 eb59db-eb59e1 1428->1430 1431 eb59e2-eb5a3c 1428->1431 1430->1431 1438 eb5a4b-eb5a4f 1431->1438 1439 eb5a3e-eb5a41 1431->1439 1440 eb5a51-eb5a5d 1438->1440 1441 eb5a60 1438->1441 1439->1438 1440->1441 1443 eb5a61 1441->1443 1443->1443
                                                                          APIs
                                                                          • CreateActCtxA.KERNEL32(?), ref: 00EB59C9
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: Create
                                                                          • String ID:
                                                                          • API String ID: 2289755597-0
                                                                          • Opcode ID: d4fe0a45c2cfb8fc10a88dc9abf2bd09f72626d8cd11906da6676f0ad043269c
                                                                          • Instruction ID: de5d0d6884efa1712fce74c93f149cc8ce71f76af9151642ffe03c418d52d384
                                                                          • Opcode Fuzzy Hash: d4fe0a45c2cfb8fc10a88dc9abf2bd09f72626d8cd11906da6676f0ad043269c
                                                                          • Instruction Fuzzy Hash: D941EFB1C00619CFDB24DFA9C8847DEBBB5BF88304F24816AD408BB255DB756986CF90

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1444 6dd1140-6dd1196 1446 6dd1198-6dd11a4 1444->1446 1447 6dd11a6-6dd11e5 WriteProcessMemory 1444->1447 1446->1447 1449 6dd11ee-6dd121e 1447->1449 1450 6dd11e7-6dd11ed 1447->1450 1450->1449
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06DD11D8
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 75d0711f30e295ed9ccc34db108a3762301644bc43b783ed46122e8186c4df49
                                                                          • Instruction ID: ec3252d51e214262df1b00ff49ade9642285602dc109017a6f74d310ff139fba
                                                                          • Opcode Fuzzy Hash: 75d0711f30e295ed9ccc34db108a3762301644bc43b783ed46122e8186c4df49
                                                                          • Instruction Fuzzy Hash: C22146B5D003099FCB10DFA9C985BEEBBF1FF48310F10842AE959A7250C7789945CBA0

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1454 6dd1148-6dd1196 1456 6dd1198-6dd11a4 1454->1456 1457 6dd11a6-6dd11e5 WriteProcessMemory 1454->1457 1456->1457 1459 6dd11ee-6dd121e 1457->1459 1460 6dd11e7-6dd11ed 1457->1460 1460->1459
                                                                          APIs
                                                                          • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 06DD11D8
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessWrite
                                                                          • String ID:
                                                                          • API String ID: 3559483778-0
                                                                          • Opcode ID: 9f69fd2a8efdfe44d35045ca0c578813232b6e047633937accea32b7181b9291
                                                                          • Instruction ID: aa0a89358d44fe8cb145bf0df5146764a8facbb0649b0aa926ce325f4d60bcef
                                                                          • Opcode Fuzzy Hash: 9f69fd2a8efdfe44d35045ca0c578813232b6e047633937accea32b7181b9291
                                                                          • Instruction Fuzzy Hash: 112127B5D003599FCB10DFA9C885BDEBBF5FF88310F108429E958A7250D7789944CBA4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1464 ebd23c-ebd6e4 DuplicateHandle 1466 ebd6ed-ebd70a 1464->1466 1467 ebd6e6-ebd6ec 1464->1467 1467->1466
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EBD616,?,?,?,?,?), ref: 00EBD6D7
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: ed036197c5493f9150dac6c285922e18534d7bdc2ef62fc0f36eb1b02127219b
                                                                          • Instruction ID: 0f7f4b6c2a110e71bab9dde6ac5629ebd04d529cdf448d4babd6dc5535aeff66
                                                                          • Opcode Fuzzy Hash: ed036197c5493f9150dac6c285922e18534d7bdc2ef62fc0f36eb1b02127219b
                                                                          • Instruction Fuzzy Hash: BE21E4B5900248DFDB10CF9AD984ADEFBF8EB48314F14841AE958B7310D374A944CFA4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1470 ebd648-ebd6e4 DuplicateHandle 1471 ebd6ed-ebd70a 1470->1471 1472 ebd6e6-ebd6ec 1470->1472 1472->1471
                                                                          APIs
                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00EBD616,?,?,?,?,?), ref: 00EBD6D7
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: DuplicateHandle
                                                                          • String ID:
                                                                          • API String ID: 3793708945-0
                                                                          • Opcode ID: c0751b01517cf0c846eab10cd55edb4571480d5ea396ae53b88d08c7b3b9f1e2
                                                                          • Instruction ID: dd22ee6c4c3b3c9446eeb13c7fb58062e1eddf23afc326b472f4b47ce51a24b4
                                                                          • Opcode Fuzzy Hash: c0751b01517cf0c846eab10cd55edb4571480d5ea396ae53b88d08c7b3b9f1e2
                                                                          • Instruction Fuzzy Hash: B32114B5900218DFDB10CF9AD884ADEBFF4EB48320F10841AE918B7310D378A940CFA4

                                                                          Control-flow Graph

                                                                          • Executed
                                                                          • Not Executed
                                                                          control_flow_graph 1475 6dd0fa8-6dd0ffb 1477 6dd0ffd-6dd1009 1475->1477 1478 6dd100b-6dd103b Wow64SetThreadContext 1475->1478 1477->1478 1480 6dd103d-6dd1043 1478->1480 1481 6dd1044-6dd1074 1478->1481 1480->1481
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DD102E
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: 7f5d93d36e68b56b82bae4bcf8794bb8a1f12d16c96c4078b0952fae084cc2fb
                                                                          • Instruction ID: 7e9d0ca306a338515f8c84c3de0dab6f4c32e5dda48f1cec6b8973d915c08bb3
                                                                          • Opcode Fuzzy Hash: 7f5d93d36e68b56b82bae4bcf8794bb8a1f12d16c96c4078b0952fae084cc2fb
                                                                          • Instruction Fuzzy Hash: BD2177B5D002098FDB10DFAAC8857EEBBF4EF88364F10C42AD559A7240C7789985CFA4
                                                                          APIs
                                                                          • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 06DD102E
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: ContextThreadWow64
                                                                          • String ID:
                                                                          • API String ID: 983334009-0
                                                                          • Opcode ID: dce234dac11a255d80d4b2778138529b2cd61c1489711401260ac19b99f526a1
                                                                          • Instruction ID: 8d5abe0ccf6c54ebef72cc268b9b6beed84d7bb81a41e0ffd1c9c7b11d825566
                                                                          • Opcode Fuzzy Hash: dce234dac11a255d80d4b2778138529b2cd61c1489711401260ac19b99f526a1
                                                                          • Instruction Fuzzy Hash: A72149B1D003098FDB10DFAAC8857EEBBF4EF88364F10842AD559A7240C7789945CFA4
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06DD12B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: e7931267d0a259328f46825e0dcbfb6bcfdc3f4cbf70a9f30b6fb65801b54834
                                                                          • Instruction ID: af266cd0de425ea08cfe9def4b69086d2d7b986a9e010137f235e36ebe2e4ec2
                                                                          • Opcode Fuzzy Hash: e7931267d0a259328f46825e0dcbfb6bcfdc3f4cbf70a9f30b6fb65801b54834
                                                                          • Instruction Fuzzy Hash: FB2128B19002599FCB10DFAAC841ADEFBF5FF48320F108429E558A7250C7399544CBA4
                                                                          APIs
                                                                          • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 06DD12B8
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MemoryProcessRead
                                                                          • String ID:
                                                                          • API String ID: 1726664587-0
                                                                          • Opcode ID: e2ce96723c5a2243f41a864113818d66a883886441fe45f28d0fb82a589c4c2d
                                                                          • Instruction ID: 809c8d379c4a40acec9f22e7919389cd23fbc4ef78fcb3bfd65838446a8dcce2
                                                                          • Opcode Fuzzy Hash: e2ce96723c5a2243f41a864113818d66a883886441fe45f28d0fb82a589c4c2d
                                                                          • Instruction Fuzzy Hash: 332145B1D002198FCB10DFA9C981BEEFBF1FF48320F10842AE959A7250C7389544CBA0
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @
                                                                          • API String ID: 0-2766056989
                                                                          • Opcode ID: 2fd018f7cc5b9afd4a770bae3864cd00126449f5cdb6d8835aef4d9a0854aab1
                                                                          • Instruction ID: b18faace9ca1869a1d54688d3499c26806f0e0d6ce9f618c28263e0413105fe5
                                                                          • Opcode Fuzzy Hash: 2fd018f7cc5b9afd4a770bae3864cd00126449f5cdb6d8835aef4d9a0854aab1
                                                                          • Instruction Fuzzy Hash: BAE194B4E04218CFDB50DFA9D880A9DBBF1FB89314F2491AAD819EB345E7319985CF50
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06DD10F6
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 2dd3c220024f8266b8b19dd5642cf2ae48ae3e422aec385c034960280c51a4ee
                                                                          • Instruction ID: 4e846b7a72f2d1a8cc0d8c8c1dd684311d2ff04e49715104c36f5ece4c6940f8
                                                                          • Opcode Fuzzy Hash: 2dd3c220024f8266b8b19dd5642cf2ae48ae3e422aec385c034960280c51a4ee
                                                                          • Instruction Fuzzy Hash: FE1167B6900249CFCB10DFA9C9457EEBFF5EF88320F24881AD559A7250C7399544CFA0
                                                                          APIs
                                                                          • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 06DD10F6
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: AllocVirtual
                                                                          • String ID:
                                                                          • API String ID: 4275171209-0
                                                                          • Opcode ID: 3550c7a7f0d7e45b89428b346dca543c4bf3cf7c77834571d112a2d3868ff921
                                                                          • Instruction ID: 93b4375011d46a8606bfaf43f080c879e4156dfec809d9a553e2b21b44cfe96f
                                                                          • Opcode Fuzzy Hash: 3550c7a7f0d7e45b89428b346dca543c4bf3cf7c77834571d112a2d3868ff921
                                                                          • Instruction Fuzzy Hash: 961137759002499FCB10DFAAC845BDFBFF5EF88320F108419E559A7250C775A554CFA4
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 3cd7200e984b35f5680e54d83e550d7d0d491a9bd93ddef5932d1d764c48dfab
                                                                          • Instruction ID: a285f5d291258e94ec35232bbacda24d31f34a0f436f86871387f2dc3c2251a9
                                                                          • Opcode Fuzzy Hash: 3cd7200e984b35f5680e54d83e550d7d0d491a9bd93ddef5932d1d764c48dfab
                                                                          • Instruction Fuzzy Hash: 801158B5D002488FCB10DFA9C4457EEFBF4EF88324F24881AC159A7250D739A545CF95
                                                                          APIs
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: ResumeThread
                                                                          • String ID:
                                                                          • API String ID: 947044025-0
                                                                          • Opcode ID: 6afa18044609fd516379d5b1ef1845669cc68f3c9fa43d73ed6082f322b7e129
                                                                          • Instruction ID: 0d8d6e92fb33cdb34d097a651fea16bc86dc15ac4a7889372b57e73d962caeea
                                                                          • Opcode Fuzzy Hash: 6afa18044609fd516379d5b1ef1845669cc68f3c9fa43d73ed6082f322b7e129
                                                                          • Instruction Fuzzy Hash: F1113AB1D003488FCB10DFAAC4457DEFBF4EB88324F208419D559A7250C775A544CF95
                                                                          APIs
                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00EBAFBE
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1765295566.0000000000EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00EB0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_eb0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: HandleModule
                                                                          • String ID:
                                                                          • API String ID: 4139908857-0
                                                                          • Opcode ID: b40f9466ce1b22aa9dc2f364c71a69aed98df0682c22139006ff830bf8784c60
                                                                          • Instruction ID: e96104d0d8cb07bb9550f06d0e37b3d52faa038f24f29e5acd99f3a8c47b165b
                                                                          • Opcode Fuzzy Hash: b40f9466ce1b22aa9dc2f364c71a69aed98df0682c22139006ff830bf8784c60
                                                                          • Instruction Fuzzy Hash: CE11EDB6D002498FCB10CF9AD444ADFFBF4AB88328F14842AD869B7610D379A545CFA5
                                                                          APIs
                                                                          • PostMessageW.USER32(?,?,?,?), ref: 06DD4895
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: c50c831de155b8c5ab21f468d6132ee99dc0be5c121614b7d206339c16e80a09
                                                                          • Instruction ID: 62ac9ea758a69994d8daa12452c2be3f5b8e7bfae5e1e04f01dd3215f44c21bb
                                                                          • Opcode Fuzzy Hash: c50c831de155b8c5ab21f468d6132ee99dc0be5c121614b7d206339c16e80a09
                                                                          • Instruction Fuzzy Hash: 4011F5B58003489FDB60DF9AC889BDEBFF8EB48354F108819E554A7650D375A544CFA1
                                                                          APIs
                                                                          • PostMessageW.USER32(?,?,?,?), ref: 06DD4895
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770710190.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6dd0000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID: MessagePost
                                                                          • String ID:
                                                                          • API String ID: 410705778-0
                                                                          • Opcode ID: 132ea0b031bce39c092ce1952dc9fe84e9bd3de1ee6533799cfd908fcbab2ad8
                                                                          • Instruction ID: 7530f22d773ac4cad90f8085d98e001262e90dd4185768355db107fa6ace4726
                                                                          • Opcode Fuzzy Hash: 132ea0b031bce39c092ce1952dc9fe84e9bd3de1ee6533799cfd908fcbab2ad8
                                                                          • Instruction Fuzzy Hash: AD11D0B5800349DFDB10DF9AD885BDEBFF8EB48324F10881AE558A7610C375A984CFA5
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: LR^q
                                                                          • API String ID: 0-2625958711
                                                                          • Opcode ID: a43b6fc2641acf3f4c9f3d9a3797261e1993028564202324c3f01fb9f03d281c
                                                                          • Instruction ID: bcbea488a6d2fcd00922f26b19850cb75831b9b49b9feab4eebca3de611e5436
                                                                          • Opcode Fuzzy Hash: a43b6fc2641acf3f4c9f3d9a3797261e1993028564202324c3f01fb9f03d281c
                                                                          • Instruction Fuzzy Hash: 3691E674E142089FDB44DFA9D4806EDBBF2FB89314F20956AE819EB345E7319A42DF40
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: b2ce31c1d535f8d3eb48d20b85ae9c623d7129d4058ec197b80ee57f6ff4a1f0
                                                                          • Instruction ID: 43f247b88958aa748f2f00d988d7a07d9057589ee132cc14036c5ad63b753c0d
                                                                          • Opcode Fuzzy Hash: b2ce31c1d535f8d3eb48d20b85ae9c623d7129d4058ec197b80ee57f6ff4a1f0
                                                                          • Instruction Fuzzy Hash: AB51BE71B003058FCB05DF7998888BEBBF7EFC5210B15896AE469CB391DB309D068791
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8bq
                                                                          • API String ID: 0-187764589
                                                                          • Opcode ID: d2fd4d8f99bc057f35a07ff4e92032dec03e6ddbc354d4329b25e4785c41da11
                                                                          • Instruction ID: e58b0943fb3a1f9246a121ed90a3bbf8992a884f4344af9bca379da8f47c07de
                                                                          • Opcode Fuzzy Hash: d2fd4d8f99bc057f35a07ff4e92032dec03e6ddbc354d4329b25e4785c41da11
                                                                          • Instruction Fuzzy Hash: 4E41E674E00209DFDB44DFA8E5909EEBBF2FB89304F109469E915AB384DB319942DF50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 8bq
                                                                          • API String ID: 0-187764589
                                                                          • Opcode ID: 0a07d9f494f636abd3d96b555edf6c8765301b27a1a113013c8202298f28e352
                                                                          • Instruction ID: 5acf299b3e917d82d6337fce904fcb0898059d1d7ca650795aee0f4ccf0e92e3
                                                                          • Opcode Fuzzy Hash: 0a07d9f494f636abd3d96b555edf6c8765301b27a1a113013c8202298f28e352
                                                                          • Instruction Fuzzy Hash: EB410775E00209DFDB44DFA8D4906EEBBF2FB89304F14846AE919AB380DB319946DF54
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 19899df1050b6cc11cda1b8f373209ddca680aa7c215c36f1f22b0d3aa0f478f
                                                                          • Instruction ID: 28359d67a8eb9308cf67adcdf3fd04e803b2e1dfba14a77a368e9dddaa0a330c
                                                                          • Opcode Fuzzy Hash: 19899df1050b6cc11cda1b8f373209ddca680aa7c215c36f1f22b0d3aa0f478f
                                                                          • Instruction Fuzzy Hash: CF31D274E02308CFDB44DFA9D9849EDBBB6FF89301F10A12AE919AB261C7319945DF40
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 7abdd30f6e4fd4a2d0ca8acd590c6ee5fd29bead2a9ec2f082fd3377cc5abfad
                                                                          • Instruction ID: 3f8eb984fcedc2fe606bd7b57d575039b7b1aaa5fe9730c4c458801e9325efc1
                                                                          • Opcode Fuzzy Hash: 7abdd30f6e4fd4a2d0ca8acd590c6ee5fd29bead2a9ec2f082fd3377cc5abfad
                                                                          • Instruction Fuzzy Hash: F831B074E05209CFDB48CFA9D4849EDBBB6FF88310F14A12AE919AB221C7359945DF50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: 349694d13921ab297d6b0394882c63304e65e39b5d532a0ebc13ea2a59e5084b
                                                                          • Instruction ID: 1605a96484adab384bab909ed5858f2b7ed18bceef0ea6bbc3be0a085167fea4
                                                                          • Opcode Fuzzy Hash: 349694d13921ab297d6b0394882c63304e65e39b5d532a0ebc13ea2a59e5084b
                                                                          • Instruction Fuzzy Hash: 9B31D174E01208CFDB48CFE8D8849EDBBB5FF48310F10912AE919AB225C7355945DF50
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: Te^q
                                                                          • API String ID: 0-671973202
                                                                          • Opcode ID: ef146cad9b5aaaed30e5ecf931f461185e60db0996402ab8e79dd4619e863308
                                                                          • Instruction ID: 8633c2e796e1dc2eceefbdb5da0126f7808b28533c93a2dbb3d0e8b5336172ca
                                                                          • Opcode Fuzzy Hash: ef146cad9b5aaaed30e5ecf931f461185e60db0996402ab8e79dd4619e863308
                                                                          • Instruction Fuzzy Hash: 7B114C71F1020A8BDB84EBB9D9005EEB6F6ABD4214B10403AC409EB344EF318E06DBE1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: m
                                                                          • API String ID: 0-3775001192
                                                                          • Opcode ID: 2b74023d708516e2a1f53bb1195dc3a07fd88a87b67c1f3a96f4d426b42f9afc
                                                                          • Instruction ID: 758622e39c1e50d35c5e82cab8144e63e5ec3fdb8e9454aafc4d04ff33f5b3c0
                                                                          • Opcode Fuzzy Hash: 2b74023d708516e2a1f53bb1195dc3a07fd88a87b67c1f3a96f4d426b42f9afc
                                                                          • Instruction Fuzzy Hash: 28E0C230D05308DFDF84EFB4D4042AD7FB8A701704F002194D44597240DB310A46EAA1
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 6
                                                                          • API String ID: 0-498629140
                                                                          • Opcode ID: 1999bc19b2301d6aa343f2ae1667e7a0743409ff6b4d8b4030c80503b9256924
                                                                          • Instruction ID: 1927d37a32653c8f25981e7059ab071948ba1d37d8fb2529e5e165a26e973dda
                                                                          • Opcode Fuzzy Hash: 1999bc19b2301d6aa343f2ae1667e7a0743409ff6b4d8b4030c80503b9256924
                                                                          • Instruction Fuzzy Hash: A6E0C234D14308EBDB50EFB4E40D2ADBFB8A706305F109695E40597240EF314A42E685
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: 7
                                                                          • API String ID: 0-1790921346
                                                                          • Opcode ID: 35425ed93acfd435569bf6659f33d98bb9a07c46285284769446a44f5b30baaf
                                                                          • Instruction ID: 1d46c67f8bdd3a473fedc2b80779f4af20715e8a59bb105441b288b100cf95b7
                                                                          • Opcode Fuzzy Hash: 35425ed93acfd435569bf6659f33d98bb9a07c46285284769446a44f5b30baaf
                                                                          • Instruction Fuzzy Hash: 4FE0C270D0530CDBCB90EFF5E4056AD7BF8A701304F402194D40697780EB350E45F682
                                                                          Strings
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID: @
                                                                          • API String ID: 0-2766056989
                                                                          • Opcode ID: c7ffbfb9c2d1e613fce76413180f678594c81e9aacac5baf120a80b61546a615
                                                                          • Instruction ID: c19170c84baabd9826f2b5e98ff668a87462e588140e831a81da73fe43ce185e
                                                                          • Opcode Fuzzy Hash: c7ffbfb9c2d1e613fce76413180f678594c81e9aacac5baf120a80b61546a615
                                                                          • Instruction Fuzzy Hash: A5E0C270918348CFE744CF25C8802EC7F69FF87260B10A298D46F9B195CB381482CB42
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 94e543bea6de627d0621efcdef6ac793e3695aab30274d3e1f2ae68b82c44c4b
                                                                          • Instruction ID: c5b96ff41dd7d8cdee71bdb1ab068a65985a741e44737f8e0b486076d66bebdf
                                                                          • Opcode Fuzzy Hash: 94e543bea6de627d0621efcdef6ac793e3695aab30274d3e1f2ae68b82c44c4b
                                                                          • Instruction Fuzzy Hash: 1AB15F74E15219CFDB40DFA8D9809EDBBB5FF89300F109625E419AB355DB30AD8ADB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 50f5cf37c207082c8861c70641786b6bfdfcfb50b3bd58103e1d320a82ac0e10
                                                                          • Instruction ID: 3902aa7d3507214e05ddcc2d6879794ce57ce4d498504b7a15d69a14f97a9473
                                                                          • Opcode Fuzzy Hash: 50f5cf37c207082c8861c70641786b6bfdfcfb50b3bd58103e1d320a82ac0e10
                                                                          • Instruction Fuzzy Hash: E1912F74E15219CFDB40DFA8D9809EDBBB5FF89300F109629E419AB355DB309D8ADB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 495db7a606df7dca74b06c5319201fd256b9d4a8455a1823a03344614f121700
                                                                          • Instruction ID: 4b2a1db4412671e3cc5e60fc7c022a2f008931ff7646999f6566bfe86c475215
                                                                          • Opcode Fuzzy Hash: 495db7a606df7dca74b06c5319201fd256b9d4a8455a1823a03344614f121700
                                                                          • Instruction Fuzzy Hash: 76819175E142198FDF51CFA8C880AEEBBB2BF49304F1094A9E819EB311D7319A46DF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c3fa0b48561ed87a8219df16960d0c091367fdea1a99faad82440b3973ac4a81
                                                                          • Instruction ID: 203ae8bc0082a1c72d5fd6cd5b6b09fc5d506a074af397a21052d9e5fbc172d3
                                                                          • Opcode Fuzzy Hash: c3fa0b48561ed87a8219df16960d0c091367fdea1a99faad82440b3973ac4a81
                                                                          • Instruction Fuzzy Hash: 0F411774E20208DFDB44DFA9D490AAEBBF2EB89314F209569E816EB340DB31D941CF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac1c21946d0b2a2d766209e23848187b8f82034f603bda1f73adad0e806333ad
                                                                          • Instruction ID: 878af1926850aaed58e9d2de3d2325f0441eb4ea3b5c22b4abc1638cad147233
                                                                          • Opcode Fuzzy Hash: ac1c21946d0b2a2d766209e23848187b8f82034f603bda1f73adad0e806333ad
                                                                          • Instruction Fuzzy Hash: 10413A74E20208DFDB44DFA9D89069EBBF2EB89314F209569E815EB340DB31D946CF54
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5e28d75c9b3797517cadcc53b82a8aa2a7b29e526a8795f50571a0d35931330d
                                                                          • Instruction ID: 3df39afc39cb94f36c1b0a6f8431dbe26fe0ddc3cc717eb8001d11c8f187ea7b
                                                                          • Opcode Fuzzy Hash: 5e28d75c9b3797517cadcc53b82a8aa2a7b29e526a8795f50571a0d35931330d
                                                                          • Instruction Fuzzy Hash: 6241E274E2020A8FCB54DFB9D8595AEBFF1AF4A315F10946AE802E7250EB35D942CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c9e5bd7cf8ad7cfd3393ca3ba22639d6ffa4539f75abca4c4c0194b396eb2c44
                                                                          • Instruction ID: 187ae984fa63396a5fedb38fdb57d13f3cb89d125e0d1ca4ed286bbcba78363b
                                                                          • Opcode Fuzzy Hash: c9e5bd7cf8ad7cfd3393ca3ba22639d6ffa4539f75abca4c4c0194b396eb2c44
                                                                          • Instruction Fuzzy Hash: 9931F074E2020A8FCB64DFB9D8595AEBFF1AF8A315F109469E802E7250EB35D941CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f9ab1c5c23786f60afc5c2e5d8f823a7377abdf4522d57717298daa82969e596
                                                                          • Instruction ID: 468fcb8b249901e24d55b05dd28d1d04a10ce919d04796ea890f7b93e8775e22
                                                                          • Opcode Fuzzy Hash: f9ab1c5c23786f60afc5c2e5d8f823a7377abdf4522d57717298daa82969e596
                                                                          • Instruction Fuzzy Hash: D73159B1A003489FCF50DFA9D844ADEBFF9EF48324F10846AE919AB210D7359944CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b0af44f6de370a10ff9a3a05540a77f9e9b47cb915b00df64fab0e80f3b73432
                                                                          • Instruction ID: 175b29880f26c362b058c9a93252ed7f8b24b18319d5d586d039b7213142063c
                                                                          • Opcode Fuzzy Hash: b0af44f6de370a10ff9a3a05540a77f9e9b47cb915b00df64fab0e80f3b73432
                                                                          • Instruction Fuzzy Hash: B931F774D54218CFEB50CF98C584EDDBBB6BF49700F21E186E815AB219C734A981DF64
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 84360138b542d817f51c8b03805ef935683a2f24d65a6a63a9d36eb62f7822b0
                                                                          • Instruction ID: f8149105dc658e3e260fe5e135d5ea127b6167bfff57e682572c7c3f77b9b94c
                                                                          • Opcode Fuzzy Hash: 84360138b542d817f51c8b03805ef935683a2f24d65a6a63a9d36eb62f7822b0
                                                                          • Instruction Fuzzy Hash: A42129B5A047900FC702EF7C9C505EF7FB6EFC5260705446BD494CB291EA30890987A1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7eb3dbb86bfb704a224d8d76be1c19da8b76df5e3cbc132c91b1091fbdb78d7b
                                                                          • Instruction ID: dfc140be12c9140656ec0b0f4b09ddaff2959dbea077a0622722c54b45c00af8
                                                                          • Opcode Fuzzy Hash: 7eb3dbb86bfb704a224d8d76be1c19da8b76df5e3cbc132c91b1091fbdb78d7b
                                                                          • Instruction Fuzzy Hash: 752145B5500300DFCB21DF14C9C0B26BF65FB98319F60C169EC0A0B256C336D88ACBA2
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f72e662a145276cbbb42f1e131d4a7b015813f28ae02a359bd0dfcf1605e05fe
                                                                          • Instruction ID: bc7c42977535b52c07605cbdfb012df9b552880ccaf6eaf6a8fc75cc6b895490
                                                                          • Opcode Fuzzy Hash: f72e662a145276cbbb42f1e131d4a7b015813f28ae02a359bd0dfcf1605e05fe
                                                                          • Instruction Fuzzy Hash: 7F212879500304DFDB15DF14D9C0B26BF65FB94315F20C169ED0A4B256C336E89ACAA6
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5434c46136956a2ce78bc33ed4d7a13c2438f92c267c3c343f2b5e19bdc7fa29
                                                                          • Instruction ID: 1cb0e039075ca62dd0060d91474909820dc09f3ba7f14ebb864af2ab437e2e7f
                                                                          • Opcode Fuzzy Hash: 5434c46136956a2ce78bc33ed4d7a13c2438f92c267c3c343f2b5e19bdc7fa29
                                                                          • Instruction Fuzzy Hash: 8B21CF70E05318DFD748CB66D8449EEBFB6BBCA700B10E065E408EB351DB784902EB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f1ef6ed000da84a5f75dca771503e3130f6d62664ffda648c57bc9a932869cc4
                                                                          • Instruction ID: a6958e6de762519a4f199470c1a7d37ef5139083106bfcf0e8af140f24922a3b
                                                                          • Opcode Fuzzy Hash: f1ef6ed000da84a5f75dca771503e3130f6d62664ffda648c57bc9a932869cc4
                                                                          • Instruction Fuzzy Hash: 313161B4E1020ADFCB50CFA9D5856EEBBF4AB08304F24A46AE814F7340E7349A41DF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763667920.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c6d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b9d7405a62bce8be675c1426a356b5fee5f15b2f3697e2fe6a5025f447bda6ff
                                                                          • Instruction ID: 3241ea54606a7b53120058fa2852f54afb4f2ea63dc33446429d1c8a7e8e0208
                                                                          • Opcode Fuzzy Hash: b9d7405a62bce8be675c1426a356b5fee5f15b2f3697e2fe6a5025f447bda6ff
                                                                          • Instruction Fuzzy Hash: 5D212671A04200EFDB25DF14D9D0B26BBA5FB88314F24C6ADE80A4B296C336DC46CA61
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763667920.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c6d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1389ca1ad5af812310bfc2fa1094664e21534f7255745582a1c3930efd919f2d
                                                                          • Instruction ID: f0ada510fe02100ec45e376b4f8667896dd4e37381409890650542ca75014214
                                                                          • Opcode Fuzzy Hash: 1389ca1ad5af812310bfc2fa1094664e21534f7255745582a1c3930efd919f2d
                                                                          • Instruction Fuzzy Hash: 95210475A04240DFCB24DF14D9C4B26BFA5FB88314F24C56DE90A4B296C33BD847CAA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1eeab699c9a59913150c7358fd1c0aee704a3fd08b418d851c4464dd9b13642d
                                                                          • Instruction ID: c819dc4d820f60e68f3d91b5f33ec8193727ec68bc5ca50015ee547580e8e695
                                                                          • Opcode Fuzzy Hash: 1eeab699c9a59913150c7358fd1c0aee704a3fd08b418d851c4464dd9b13642d
                                                                          • Instruction Fuzzy Hash: 3331E0B0D01358DFDB60CF9AC989B8EBFF5AB48314F24945AE404BB250C7B56885CF95
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 25b35853daec88c9b96d6c9193342942d5416f55377e05b15d8edbdc306b6c10
                                                                          • Instruction ID: 3bcc2b6cc6929bedadddf9e333d2e1f9cec3d3fd4caa32ce661caf979bff2231
                                                                          • Opcode Fuzzy Hash: 25b35853daec88c9b96d6c9193342942d5416f55377e05b15d8edbdc306b6c10
                                                                          • Instruction Fuzzy Hash: 9A31E0B0D00318DFDB60DF9AC988B9EBFF4AB48314F24945AE404BB250C7B55885CF95
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6292541479a9307b9c42739c7d743fabbf607a841e0c46e80c11d2991f64a331
                                                                          • Instruction ID: 058c595c41d389088d1f2f756f9cbfca2cf7910926436d95b97a8ff8fe1f4175
                                                                          • Opcode Fuzzy Hash: 6292541479a9307b9c42739c7d743fabbf607a841e0c46e80c11d2991f64a331
                                                                          • Instruction Fuzzy Hash: E311E3B1A09388AFCB46CBB4CD2546D7FF9DF52200B6544E6E804CB283E935CD06D722
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f119a91f51dbab667d301fd1c68380c227763ff75caa8e859abf80120e58edc2
                                                                          • Instruction ID: 4627ea22e7ed22b587ee41f238361dbd743899fb9ebe1f72e479b6cad791a4e0
                                                                          • Opcode Fuzzy Hash: f119a91f51dbab667d301fd1c68380c227763ff75caa8e859abf80120e58edc2
                                                                          • Instruction Fuzzy Hash: A1210C749153098FDB44DFA4D5855EDBFB6FB84314B60A12AB81A9F358DB704C06CF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dcd7912e216caf112a6e7238a6320d352d9a5984794c2dd73983518dce435ca7
                                                                          • Instruction ID: 3dea5f0f2cee1820a833dc3fa7477ad20e98a35b575f64676982f9ab4a181f88
                                                                          • Opcode Fuzzy Hash: dcd7912e216caf112a6e7238a6320d352d9a5984794c2dd73983518dce435ca7
                                                                          • Instruction Fuzzy Hash: D92107B1D146588BEB18CF9BC8053DEBFB6BF89300F04D16AE419AA264DB740946CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4e7e8756e4cf14f25cdf9218926bf109409cf6e9bbf01e6a5a91fbf7e9b351d5
                                                                          • Instruction ID: 9ccbf3885fac6cef792c36767f4514fc32dd0fa216f5bdccf9ed073a046a318c
                                                                          • Opcode Fuzzy Hash: 4e7e8756e4cf14f25cdf9218926bf109409cf6e9bbf01e6a5a91fbf7e9b351d5
                                                                          • Instruction Fuzzy Hash: 7421A7B4E1024ACFCF50CFB9D5446AEBBF0AB09304F1495AAD424E7340E7349A41DF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763667920.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c6d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4fc7fb495ab6b5c4b96ecec40aa7f6f3fd6612049fb90be2d0e024dcd560feaf
                                                                          • Instruction ID: c5d8b69bd63d7e11fb987009a7bb4107cf7e7ec2fa960c06414d03107bd7daa4
                                                                          • Opcode Fuzzy Hash: 4fc7fb495ab6b5c4b96ecec40aa7f6f3fd6612049fb90be2d0e024dcd560feaf
                                                                          • Instruction Fuzzy Hash: C8215E755093808FDB12CF24D9D4B15BF71EB46314F28C5EAD8498F6A7C33A990ACB62
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c0c139b803e5760d6727f55e70148c8a8eb040dcad3c86acabe32e9a1a91bc1f
                                                                          • Instruction ID: 03d2585af124e8d3b723641b79d0f17cc7ce317e751b0e38120af104f7163b2a
                                                                          • Opcode Fuzzy Hash: c0c139b803e5760d6727f55e70148c8a8eb040dcad3c86acabe32e9a1a91bc1f
                                                                          • Instruction Fuzzy Hash: BA11A3B0F003048FDB589E799824ABF7AE6EFC4760F149529E916DB398EA30C94097D0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: a640eed3dbad715289046c80dd567e7befc4c7972287e4c3833dbb8bc46936b8
                                                                          • Instruction ID: 8314624455250fdec56521ffef0bd6e9eb8319da865c8a0210ecd018cab022c7
                                                                          • Opcode Fuzzy Hash: a640eed3dbad715289046c80dd567e7befc4c7972287e4c3833dbb8bc46936b8
                                                                          • Instruction Fuzzy Hash: 36119130A88208DFD741CBA9C544AFCBFF9AB49700F24A194E40ADB215DA34CE40EB80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: efb09fdfa5e58444b4128ffd064b15584cb535460bf72e92f489871c3374a31d
                                                                          • Instruction ID: 4b4b04d4d9b563ca4fd77133176072b8ded714815ab8656d4d811ff836e65e60
                                                                          • Opcode Fuzzy Hash: efb09fdfa5e58444b4128ffd064b15584cb535460bf72e92f489871c3374a31d
                                                                          • Instruction Fuzzy Hash: 3121E7B1D106188BEB18CF9BC8457EEFEB6BFC9300F04D06AE4196A254DB740946CF90
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d48c3083037d01fbff2a30c35536f0a89c95258680ccf95f1eec47f19a4f4aac
                                                                          • Instruction ID: d885db3d97b8817fe2a771e3b20bc85745ac61aa00e101b53b6f432eb71d53fd
                                                                          • Opcode Fuzzy Hash: d48c3083037d01fbff2a30c35536f0a89c95258680ccf95f1eec47f19a4f4aac
                                                                          • Instruction Fuzzy Hash: 5B21E4B59003499FCB10CF9AD884ADEBFF4FB48364F108459E919A7210D375A954CFA5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction ID: 8e88fa9ceb2dc42cdea5361680bf123b7ddd21900d4afc8310768e4145ade18e
                                                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction Fuzzy Hash: 3911CD76404340CFDB16CF00D5C4B16BF62FB94324F24C2A9DC0A0A256C33AE99ACBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction ID: d18bd830a849617bfe79776d09d209ae57f696e5f1203382e9f0b216d830e1a0
                                                                          • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                                                          • Instruction Fuzzy Hash: FA11AFB6504280CFCB16CF14D5C4B16BF71FB94318F24C6A9DC4A0B656C336D99ACBA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 0c34045a45ba116132029cca84a963a6d0ef479653e7be0645334f52709b0d2f
                                                                          • Instruction ID: 40ce13c461177209b11e904ea50ef0ce291cb405e5172664e5cd0e35bccd6a50
                                                                          • Opcode Fuzzy Hash: 0c34045a45ba116132029cca84a963a6d0ef479653e7be0645334f52709b0d2f
                                                                          • Instruction Fuzzy Hash: 07113D74D59318DFDB84CFA6D9448FCBFB6BF8A701B20A059E4199A211CB389902DF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763667920.0000000000C6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C6D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c6d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                          • Instruction ID: 0336a92419dc5aabc383f37ac602ee08fb1c6e93a308a002ef8c9d47e96feb54
                                                                          • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                                          • Instruction Fuzzy Hash: 4811BB75A04280DFCB22CF10C5D4B15BBA1FB84314F28C6AAD84A4B296C33AD84ACB61
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 027786f477884f5f72ed70f8b26a1c84184d3053f75f1999cd23b99d9fbacd9e
                                                                          • Instruction ID: 270e7dcedde43262f1f187f4041d16d0c6317f559090bef267ae078fd9f3fbe8
                                                                          • Opcode Fuzzy Hash: 027786f477884f5f72ed70f8b26a1c84184d3053f75f1999cd23b99d9fbacd9e
                                                                          • Instruction Fuzzy Hash: 0501C030989308EFC742CFA4D8559FCBFB8AB06701F2561D5E446CB262E6348E81EB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b5c964a79ade4a8148a5aacb2a4ccdd0e25062c68e9fdf71a0fca4be41a0f09d
                                                                          • Instruction ID: ec7e2d2b16e46d634fd659d4abe309923d5934716c633be37700ad80acbb6aba
                                                                          • Opcode Fuzzy Hash: b5c964a79ade4a8148a5aacb2a4ccdd0e25062c68e9fdf71a0fca4be41a0f09d
                                                                          • Instruction Fuzzy Hash: 0A01D471E593498FCB41CFA8C8456AE7BB1EB0A300F349496D864D7341E7309B02DB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f525d24ae82139301ce4698b5b52b18583f13c5661f3944ad59a395856846366
                                                                          • Instruction ID: f61f3e93c7c174a7d3012c00f43b9ec9ef290d5b14e9917eb9c26bb1e741c4f2
                                                                          • Opcode Fuzzy Hash: f525d24ae82139301ce4698b5b52b18583f13c5661f3944ad59a395856846366
                                                                          • Instruction Fuzzy Hash: B5110970E15218DFDB48CFAAD9449EDBBBABF8A700F10D069E419AB354DB749901DF80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b0590f50f680f65d4a9294a591dbebdbabccc4cbc98245c4b2546385b6731431
                                                                          • Instruction ID: 8a2e6c8100b5f44bb73f77438bf5223e7fe68e553e474a976b6ab98486d498fd
                                                                          • Opcode Fuzzy Hash: b0590f50f680f65d4a9294a591dbebdbabccc4cbc98245c4b2546385b6731431
                                                                          • Instruction Fuzzy Hash: 2D012035004300DAE7304B16CD84757FFD8DF55361F18C45AED1A4A24AC339D8C4C675
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5a09a59719dfde43e36ade4714995ead2cb9081b9a38f967d21e98589b06430a
                                                                          • Instruction ID: d41d9ce04fd52bd6e19caf3314768b307da618178d8aac58da1760564191a593
                                                                          • Opcode Fuzzy Hash: 5a09a59719dfde43e36ade4714995ead2cb9081b9a38f967d21e98589b06430a
                                                                          • Instruction Fuzzy Hash: BE012834A44208EFD744DBA9C585AACBFF5AB4D700F24D094A409EB365DB749E00EB40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6d80598affaa7d505492e52dbc4082c4439be4d552de941effd749641727b816
                                                                          • Instruction ID: 5b295cb1da00a460fbc45bcf37e18a83c21163ab0db4b6bcc388f5ef61353243
                                                                          • Opcode Fuzzy Hash: 6d80598affaa7d505492e52dbc4082c4439be4d552de941effd749641727b816
                                                                          • Instruction Fuzzy Hash: A5F06D30988305DFD745CB65C5419FCBBB8AB4A741B20B1A4901B9E211D7388A81EBC1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 5e339e21855ea9f0947353b8e09d82eda4e2e2833426ba027f8cf3337a24e098
                                                                          • Instruction ID: 41abc934ee9e1389912a3cb5b4709e471439a6985446d064246901fdb65af80b
                                                                          • Opcode Fuzzy Hash: 5e339e21855ea9f0947353b8e09d82eda4e2e2833426ba027f8cf3337a24e098
                                                                          • Instruction Fuzzy Hash: B401FF74E04209DFCB90DFA8C5406AEBBF9FB49300F1094A99819E7340EB319A02DB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c3d5dc5ad116b5c14d9c4908f0d99b59ad921b704312e0734678821f0c1a0090
                                                                          • Instruction ID: 89cb9ddf832cb1857bafafdab5afcc22e0216c47154701f4fe14757d3cb48eee
                                                                          • Opcode Fuzzy Hash: c3d5dc5ad116b5c14d9c4908f0d99b59ad921b704312e0734678821f0c1a0090
                                                                          • Instruction Fuzzy Hash: 5C110930904205CFDB50EF98E989B98BBB5FB49310F20A296E409AB394DB309D81CF60
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 149885caeeb0109196dcbecfbfc32d690c21ea568b1269ce6fc7ed749396265b
                                                                          • Instruction ID: ec64bcab6526ce9be6aa36c17c02297f0e5fa86631ace62e99f87853ee5c6154
                                                                          • Opcode Fuzzy Hash: 149885caeeb0109196dcbecfbfc32d690c21ea568b1269ce6fc7ed749396265b
                                                                          • Instruction Fuzzy Hash: D3017175908344CFD750CF94D44AAADBFB5BB09305F18A0A9F809DB312CB309942DF91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1290bbc5c765769df45494f64ca8e44edc7ee2cd3fd811a00e796898f32fb6c6
                                                                          • Instruction ID: 98f7e36a9a45f897303b38ee163284f412302c607fd66eb83c528ccab870cdc6
                                                                          • Opcode Fuzzy Hash: 1290bbc5c765769df45494f64ca8e44edc7ee2cd3fd811a00e796898f32fb6c6
                                                                          • Instruction Fuzzy Hash: 7101A274E05209CFCB51DFA8C4406AEBFB4EB45314F2485AED814EB381DB358E06DB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ec47f1c71d0fe39c26c756be1a131d2c08a85e640c4ecc56b0f2f729749e49cc
                                                                          • Instruction ID: d8453ee7a870c02a36404ebb453b0e9599e0900f370598d61b14197a1632ba0c
                                                                          • Opcode Fuzzy Hash: ec47f1c71d0fe39c26c756be1a131d2c08a85e640c4ecc56b0f2f729749e49cc
                                                                          • Instruction Fuzzy Hash: 8A01F6B4E0420ADFCB94DFA8D5012AEBBF4EB48300F1094A99809E7340EB309A01DB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 54e59bf72613c2bd9e6a08c8ede5ff1163dce97222ba6c498f7f523443bc61f1
                                                                          • Instruction ID: 08dc93487f69ac899e320cae3cbf2313f231ad8ef4a35df896e871638393b47c
                                                                          • Opcode Fuzzy Hash: 54e59bf72613c2bd9e6a08c8ede5ff1163dce97222ba6c498f7f523443bc61f1
                                                                          • Instruction Fuzzy Hash: 850146B4E0020A9FCB90DFA8D9423AEBFF4FB49300F0094A99804E7741EB759A11CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 30db217b05d3e399540599c88b14d2f35891916858be473a590f549a974a3833
                                                                          • Instruction ID: 0aca73b03bc90af6f9d8c3a58c70f82f4548f06237b38efcf048d106f597f85d
                                                                          • Opcode Fuzzy Hash: 30db217b05d3e399540599c88b14d2f35891916858be473a590f549a974a3833
                                                                          • Instruction Fuzzy Hash: 17F09CB4D043099FCB01CFE8C9055DDBFB1BB4A310F259595E454E7251E7344A42DB50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 785facecd8386e4e4665b4d0cce4a73164614f779ace5be53b50061c1d2f88bb
                                                                          • Instruction ID: 71b60580f58e84f150da094259ee1277a4ac8ba144ff9eb069cdc3dc88eea2ed
                                                                          • Opcode Fuzzy Hash: 785facecd8386e4e4665b4d0cce4a73164614f779ace5be53b50061c1d2f88bb
                                                                          • Instruction Fuzzy Hash: 0801E934E053098FDB04DFD4D6895EDBBB6EB84311B70A12AA80A9B358DB704C45CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1763603277.0000000000C5D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C5D000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_c5d000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4e2b848511815049e269ecdca0f7ca5af01d1fc397bfe4097c49ffb4a533a96b
                                                                          • Instruction ID: f23a486c31d972e44eb6a49c2ef553b4359569535e98e8a5a4875a07a5a7f314
                                                                          • Opcode Fuzzy Hash: 4e2b848511815049e269ecdca0f7ca5af01d1fc397bfe4097c49ffb4a533a96b
                                                                          • Instruction Fuzzy Hash: D2F0C2750043409EE7208A16DC84B62FFA8EF54765F18C45AED190A28AC2799884CAB0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1c9bc30fa5d3d6760596df5220055a5b7e9e01b2b52d186296ac6714e228c800
                                                                          • Instruction ID: bf378524a32e5e48f916c39f30a379db006f7108b2cfea97e3404178baefff84
                                                                          • Opcode Fuzzy Hash: 1c9bc30fa5d3d6760596df5220055a5b7e9e01b2b52d186296ac6714e228c800
                                                                          • Instruction Fuzzy Hash: 9EF0FF74E04209DFCB40EFA8D4456AEBBF4EB45304F1095A9D814E7341DB759A06DB84
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1e8f86150353d453b45c6afe4e4b6660c0c4a231155056476d05e0175e1c80d4
                                                                          • Instruction ID: 4ed8dc53556fa00a2e9b86b193a9f11e5b93d0b0996d3e7c6e1636b52fe40ee2
                                                                          • Opcode Fuzzy Hash: 1e8f86150353d453b45c6afe4e4b6660c0c4a231155056476d05e0175e1c80d4
                                                                          • Instruction Fuzzy Hash: A6F01D74D14308DFCB40DFA995052DEBFB5AB0A204F0195A6D454E3251EB344A46DB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: ac70313ed8966641c26d574f17b29e5ac2b1cb264268b8149bd2f4cb4eb6dbe0
                                                                          • Instruction ID: 74ef93fe1099e1ca8371ab86d30bb8d20a6015f68ed0a0bf558f94c9572062c5
                                                                          • Opcode Fuzzy Hash: ac70313ed8966641c26d574f17b29e5ac2b1cb264268b8149bd2f4cb4eb6dbe0
                                                                          • Instruction Fuzzy Hash: A9F01DB4E01309DFCB41DFA9D9052EEBBF4BB49300F1095A9D818E3340EB309A02DB90
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 2aab3342ec5d7054f2353340ba9919960255abfbc80c9015142a254b397dbed0
                                                                          • Instruction ID: 843da8c9db6d64f904e7054867da14f538942f43c69e33d9673c73c9c65c3931
                                                                          • Opcode Fuzzy Hash: 2aab3342ec5d7054f2353340ba9919960255abfbc80c9015142a254b397dbed0
                                                                          • Instruction Fuzzy Hash: 23F0E2B2A04348AFDF85CBB8DC5599E7FBAEF44220B05C0ABE049DF225E23199419B54
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 470a70ff352b5ad03556813ac86bc8dc44526200e2aa92246053c5cda518e83a
                                                                          • Instruction ID: 4742df4d24cb120da7f2baaec32dbf00456b0ee36775493ef743ab68fd7e877a
                                                                          • Opcode Fuzzy Hash: 470a70ff352b5ad03556813ac86bc8dc44526200e2aa92246053c5cda518e83a
                                                                          • Instruction Fuzzy Hash: 84F0A430905208DFEB90DBA9D5447EDBBB9AB84300F5094A5E405A7284DBB05A40CF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 025f5d287a5f5d7590b9985761c3a8dba74b5a2629ea3385d1a1e5a396b04f55
                                                                          • Instruction ID: e9144ac3c09955c91929c8744f1b1065621a97b14ea55048f347636367741dee
                                                                          • Opcode Fuzzy Hash: 025f5d287a5f5d7590b9985761c3a8dba74b5a2629ea3385d1a1e5a396b04f55
                                                                          • Instruction Fuzzy Hash: A8F0F9B4D0520ADFCB40DFA9D5415EEBBF4BB48300F1095A9D818E3340EB309A02DF91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 89176bde35ff708edf015332981821b9789e5f947f324608826fba38f005f668
                                                                          • Instruction ID: 872aa09dd800b8b3a09407353d7f11e001a4987f06efcce16063ba1ddfd1bbb6
                                                                          • Opcode Fuzzy Hash: 89176bde35ff708edf015332981821b9789e5f947f324608826fba38f005f668
                                                                          • Instruction Fuzzy Hash: 53F097B4E0520ADFCB44DFA9D5455AEBBF5BB49300F2095A9E829E3340EB309A41DB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 541e11ff2c3e2ee457bd38867500331c9ec99f517ce471ea3a0a8d88ff49d707
                                                                          • Instruction ID: 76b41cfad66f33fa864b377294937b4827df73347adaadf836723e2995a588bc
                                                                          • Opcode Fuzzy Hash: 541e11ff2c3e2ee457bd38867500331c9ec99f517ce471ea3a0a8d88ff49d707
                                                                          • Instruction Fuzzy Hash: 0F012C30904205CFC710DFA8E889B9CBBB5FB49310F24A2A6E419AB395DB309D81CF50
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 56f9c0437df9ae1bbd3ef6b6fe29e9322fce1470fc1bdf88b1561f1a305c442d
                                                                          • Instruction ID: 9c1468a4945d7227dc42bd61669f9e5a0a169900e45e64d6523b273004e669cd
                                                                          • Opcode Fuzzy Hash: 56f9c0437df9ae1bbd3ef6b6fe29e9322fce1470fc1bdf88b1561f1a305c442d
                                                                          • Instruction Fuzzy Hash: 7AF06270E143169FD754CF65C806AEEBFF1BF08211F144599AC10EB242E7398406CBD0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 04ea497e49c8e191d2df4909e58ea82e071bbb3e55c22f89bdd7e02f12eba131
                                                                          • Instruction ID: c50108be6239d5355a3c0761494709ff77eef7159c71017474470bb9bc615512
                                                                          • Opcode Fuzzy Hash: 04ea497e49c8e191d2df4909e58ea82e071bbb3e55c22f89bdd7e02f12eba131
                                                                          • Instruction Fuzzy Hash: 46F03A74D14208AFDB80DFB9D84A2EDBFF5EB0A304F0099AAD814E3210EB745A41DF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: dd11eded4b59ea3462f29fa7bb9c0822c53391d46770b8e38d9429a2fd5134a0
                                                                          • Instruction ID: 4c7a918edc01a3b6eb02b968df861f1784ac2fb2281498da82daef842f4c9475
                                                                          • Opcode Fuzzy Hash: dd11eded4b59ea3462f29fa7bb9c0822c53391d46770b8e38d9429a2fd5134a0
                                                                          • Instruction Fuzzy Hash: 5CF0B7B4D14209DFCB84DFA9D5455AEBBF9EB09304F00A9AAD418E3200EB745A41DB81
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 88b75b4d962638d97834ef8761c010232dda448af1cd57620bf53159c9ccf569
                                                                          • Instruction ID: 280ff08dda598842d97f36caad36ca37dd88a88243a444efbffcab5ea9af4065
                                                                          • Opcode Fuzzy Hash: 88b75b4d962638d97834ef8761c010232dda448af1cd57620bf53159c9ccf569
                                                                          • Instruction Fuzzy Hash: 76F0B7B4D14209EFCB80DFB9D5465EDBBF5AB09304F10A9AAD828E7310EB705640DF40
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: df7dcd6df7db3cdbf885779506108083b8dc72457ee48be3c258c1d2cacedaad
                                                                          • Instruction ID: 5c93c6b6a35c7af93347dc3a8e331a7510beae333503639d892d7105fd30b662
                                                                          • Opcode Fuzzy Hash: df7dcd6df7db3cdbf885779506108083b8dc72457ee48be3c258c1d2cacedaad
                                                                          • Instruction Fuzzy Hash: B9F0DAB0D0431A9FDB54DFA9C841AAEBBF4BB48200F1085AAE918E7201E7759541CB91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 488ee38d7a25915b41a3ce1534f5fd7cb1ff8106c2fc3a6b4481d97c78aa88d2
                                                                          • Instruction ID: 6a184dd31c8d356d1f2290652a7dd6a72e1e208d0b7f30b9310cb89891dcf755
                                                                          • Opcode Fuzzy Hash: 488ee38d7a25915b41a3ce1534f5fd7cb1ff8106c2fc3a6b4481d97c78aa88d2
                                                                          • Instruction Fuzzy Hash: 19F0F9B6914204CFC740DF68E48289CBFF5BB19315744A169F815DB321DB309842DF80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: e1a21b50bbb851875eca9e2d81fc858376c9da2033324a4d98ebad2d813dd561
                                                                          • Instruction ID: 6cf46d92cc8052476bd4ac5f5bbf1b180ace3ff61d9dad316498eaadcde0edb2
                                                                          • Opcode Fuzzy Hash: e1a21b50bbb851875eca9e2d81fc858376c9da2033324a4d98ebad2d813dd561
                                                                          • Instruction Fuzzy Hash: 53F09A34A06218CFDB54CF54D945BE8BB76EF84210F20A1AAE40D97314DB300E8ACF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f592509e8615dd185ef104bb6a4b6a83362ce8ea4547a73719bef441ade0d065
                                                                          • Instruction ID: e67279759021ea4c2b7eeea637d9e361414817c2db26d515c77fee50178090c3
                                                                          • Opcode Fuzzy Hash: f592509e8615dd185ef104bb6a4b6a83362ce8ea4547a73719bef441ade0d065
                                                                          • Instruction Fuzzy Hash: ACF06730E112458FCB40DFA4D5856EDBFB2FB48300B60A02AF81AAB348CB340802CF00
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 543068d043b066cb9e78ee4042d6a1d2895b7e7fe847f95315cf8b6f6a6193aa
                                                                          • Instruction ID: 881b9cb2f3913e1d53a6940e91c3553d3de7f4178e2fbe704279d75d92d24afe
                                                                          • Opcode Fuzzy Hash: 543068d043b066cb9e78ee4042d6a1d2895b7e7fe847f95315cf8b6f6a6193aa
                                                                          • Instruction Fuzzy Hash: 7AF0C974E15208EFCB90DFB8D4456AEBFF4EB0A300F10A5A9D809E3200EB345A40DB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6b2d30e27490adf3a067c29210ddc095cd58a76cf1cc67a237e8151c07c7470c
                                                                          • Instruction ID: a11880f87917c49e93ee244ee77b5c34aad35e32af120a1141b6b70d6f45d8ff
                                                                          • Opcode Fuzzy Hash: 6b2d30e27490adf3a067c29210ddc095cd58a76cf1cc67a237e8151c07c7470c
                                                                          • Instruction Fuzzy Hash: 4FF03474905248AFCB46DFA9D4456ACBFB0EB4A302F0081AAE854AB351CB384A52EF51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 4a92b10ea501091811cd24042351259da8b6b67c632198834714d4e46d33bda5
                                                                          • Instruction ID: 7a3f14863cf74f040e0890ce3ea13a7e1326a6b4a1ecd5e648638ec1635617ff
                                                                          • Opcode Fuzzy Hash: 4a92b10ea501091811cd24042351259da8b6b67c632198834714d4e46d33bda5
                                                                          • Instruction Fuzzy Hash: 38E0D8B0840345DFE750DF79C949A997FF1EF08325F64C5A5E426CB2A1EB3985028F80
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 17e7015f3b7a299ef9b9dccaf3eeaa49c407d97f40881430aacc69b85b0643c5
                                                                          • Instruction ID: 120a17aa07c05cb9caee011ccfbb138bbf0218583e6e10ec2edcb15a7680c21b
                                                                          • Opcode Fuzzy Hash: 17e7015f3b7a299ef9b9dccaf3eeaa49c407d97f40881430aacc69b85b0643c5
                                                                          • Instruction Fuzzy Hash: A5F03974E0020CEBCB44EFA9D40569CBFB5EB49301F40C1AAE818A3340DA345A51EF81
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: be1a1cbedae0764cd695825448ba557e6596b068fdf41a25f88a767808d1dddf
                                                                          • Instruction ID: f1e114dc63232ddedf1418a76907b749661c1a49d8cfac5573a04c38a155d5f5
                                                                          • Opcode Fuzzy Hash: be1a1cbedae0764cd695825448ba557e6596b068fdf41a25f88a767808d1dddf
                                                                          • Instruction Fuzzy Hash: 73E08C30901208DFCB80EBA494046AD7AF8AB01304F5065A9D4059B380DB310B45E682
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d60c7187495769de8c9c7cfaca99a750ddc0938546cb6fd232f8f9f9a055e978
                                                                          • Instruction ID: b01480ab7d3352c302ec0c7a93a61bee846f3c94f1c3ca569c331df0720668aa
                                                                          • Opcode Fuzzy Hash: d60c7187495769de8c9c7cfaca99a750ddc0938546cb6fd232f8f9f9a055e978
                                                                          • Instruction Fuzzy Hash: F0E0C272C0022CAB8B00AFA9DC054EFFF38EF05640B828025E814AB201D3705A21DBC0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b8488d117c546838186ac75ff18a03b65253528479756b614639ab5bf3dae183
                                                                          • Instruction ID: 0ef000b9508fce4b3170837a92658d0408866148982491d20e0fc9654fdcdcfc
                                                                          • Opcode Fuzzy Hash: b8488d117c546838186ac75ff18a03b65253528479756b614639ab5bf3dae183
                                                                          • Instruction Fuzzy Hash: DEE092B0D40209DFD780EFA9C905A9EBBF0AF08204F11C5A9D419EB251EBB496048F91
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 75be9c9743d6bdc6bbd736fea06f53ae486c17fdab2b2f31c00837f09e4171dc
                                                                          • Instruction ID: 4540f24f13eb830cf532467d88a548f15e01b294f18abbc15a64ec19223fcb5b
                                                                          • Opcode Fuzzy Hash: 75be9c9743d6bdc6bbd736fea06f53ae486c17fdab2b2f31c00837f09e4171dc
                                                                          • Instruction Fuzzy Hash: B4E01770D26208EFCB80EFF9E84A6ADBFF4AB05201F5050A9E808A3350EB705A45DB41
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d456decb9c98554aed504a12836501f9372a6ce7acb41fc21c7ad8f349508f55
                                                                          • Instruction ID: 24373e61c26e7683404c1fea7b133e56aeb1f42fc1faa16769df9aff9a4fee81
                                                                          • Opcode Fuzzy Hash: d456decb9c98554aed504a12836501f9372a6ce7acb41fc21c7ad8f349508f55
                                                                          • Instruction Fuzzy Hash: 78E09278D047488BDB54DFE8D4841ACBBF6FB89301B106529E82AAB345DB3018469F01
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 1f24165998cfe2daced1ff780ed2782e6d6fc81f83d89d77b716ee30607b8b3b
                                                                          • Instruction ID: 57b00c0170f26a3d627099e5859b58b268387a268d9550b959ccf347c1cc5b15
                                                                          • Opcode Fuzzy Hash: 1f24165998cfe2daced1ff780ed2782e6d6fc81f83d89d77b716ee30607b8b3b
                                                                          • Instruction Fuzzy Hash: 46D0A93240020083D2057386F80B3AC3FA8A70B225FA83030B01CC8152CEB85808CF95
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                          • Instruction ID: 3cb7a905df42f29b052cff5f288f6ff35394efdb8cb6bb0d7c2b96e15ce13b28
                                                                          • Opcode Fuzzy Hash: fcc788c89ca91730e34b729ea8219a5e8389f3dd18a4f57a8284d2c23dda9339
                                                                          • Instruction Fuzzy Hash: ACD09E72D001399B8B10AFE9DC054DFFF79EF49650B518126E925AB100D3715A21DBD1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: af8bd9e1151c9f791632b8c21c029e461a0a15d09ad508a1208519df13e12cdc
                                                                          • Instruction ID: 86af664a07b6db80d8064c71577c983eb0f8fe5bd5271b080d45e1ce3bd3317b
                                                                          • Opcode Fuzzy Hash: af8bd9e1151c9f791632b8c21c029e461a0a15d09ad508a1208519df13e12cdc
                                                                          • Instruction Fuzzy Hash: FBD01738969269CFEB58CF11CC095FDBF3AFB5A201F04A559A41E62210CB300946EED0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 7fc3e4621c61bb8351c8f78cb4a63471e4e44fc61323292c512ac81f7c62362e
                                                                          • Instruction ID: 6d68f2371750f54ecdc380cd9be9a9e9766c5c61ef580bc8827f2c0e5708062d
                                                                          • Opcode Fuzzy Hash: 7fc3e4621c61bb8351c8f78cb4a63471e4e44fc61323292c512ac81f7c62362e
                                                                          • Instruction Fuzzy Hash: F0D012760482845EC74267648C1C8617FB9BFA63017579497E4C0CE076D510499AF75A
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 6493788ac5b6288f93aeba2ace7a780836aac5ea0d1fd599799e1ef0c06704fa
                                                                          • Instruction ID: b0fa9777eb8b604552f49c66758e8f85159967d56a828c63b898eecb7bcf3134
                                                                          • Opcode Fuzzy Hash: 6493788ac5b6288f93aeba2ace7a780836aac5ea0d1fd599799e1ef0c06704fa
                                                                          • Instruction Fuzzy Hash: E8E04634418511CFEB90DFACC48889CBB75FB44300F11A0E2E80A6B116CB30A980DF61
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 94775162598f212e6fefdcaafdd478340223795cd1bc54aa7138692c348aa5dd
                                                                          • Instruction ID: 310c372dba6e8cf0bd397b61c55542e9b2a9ae55dde75641eb97cff85e83a7d4
                                                                          • Opcode Fuzzy Hash: 94775162598f212e6fefdcaafdd478340223795cd1bc54aa7138692c348aa5dd
                                                                          • Instruction Fuzzy Hash: 81D05235A4A208CFEB10CB48E940BECBBBAFBC6220F0011E5D00D96214CB301E8A8F11
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: c4754407db1ba87effa6fecd292b4842f6ebdbd9b8f28b66af17f721a1f70c00
                                                                          • Instruction ID: 16637cd2f572f7faab4abefcde3f981e5256042a1fd7cc192d8faff589b61ff6
                                                                          • Opcode Fuzzy Hash: c4754407db1ba87effa6fecd292b4842f6ebdbd9b8f28b66af17f721a1f70c00
                                                                          • Instruction Fuzzy Hash: 55D012361542089F8BC0EFD5E800C667BDCBB14710700D432F504CB422F622F434EB51
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 97acc80cf45fb4abf8205d1564ab221cd984015d7728b5cd4b78185f55bf31cc
                                                                          • Instruction ID: d137199d1c5193f3c77e3ecb2dbfd22f878b11dec19beb0e90816a9c4749dec3
                                                                          • Opcode Fuzzy Hash: 97acc80cf45fb4abf8205d1564ab221cd984015d7728b5cd4b78185f55bf31cc
                                                                          • Instruction Fuzzy Hash: 47D01272949004DFDB405F98F44E0ECB734FB9675271110B3DA1ED901297360E6AEFA0
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 364c6f9c2b1ff802ca6ee53600e3ba5778acb0e7dfa6f58cab091cec6a1bd1a0
                                                                          • Instruction ID: b0380175c9ffde71f3babaddba303bc0458ae7ed30a5b71e743951b61eeaa35c
                                                                          • Opcode Fuzzy Hash: 364c6f9c2b1ff802ca6ee53600e3ba5778acb0e7dfa6f58cab091cec6a1bd1a0
                                                                          • Instruction Fuzzy Hash: 50D01730904200CFD700CF58E089A99BFF6BB09315F19A069E8049B221CB309881CF49
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 405ebf8a3ee8c83349a0246fffb9bedf33c25cdc6b7eb439849fdd2de60dda90
                                                                          • Instruction ID: 06f7f1ad6b72c50425cbc5b735e202ac2b2bb5ad16fb2fbc5a196dda5481a0d8
                                                                          • Opcode Fuzzy Hash: 405ebf8a3ee8c83349a0246fffb9bedf33c25cdc6b7eb439849fdd2de60dda90
                                                                          • Instruction Fuzzy Hash: E0D0C7315052058FD754DB14D589ED87BBAFB85304F30A7A6D0095F359CF70598D4F44
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d11a915df988af20fb30b647f4a3357d59f4ce5252ec6a06e7b0530f9398e859
                                                                          • Instruction ID: 7a678185e2338be397d4e2d8013d166e0886204fe86f14839d114393586433e1
                                                                          • Opcode Fuzzy Hash: d11a915df988af20fb30b647f4a3357d59f4ce5252ec6a06e7b0530f9398e859
                                                                          • Instruction Fuzzy Hash: ADC08C3005170587C20877DAF50F3B87FA8AB02306F906020B00C014604EB40804CFA1
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: b1434bfbf1b0534d2663c8637ca4983eca7f8b7174a955a4e428453c0505df9c
                                                                          • Instruction ID: 723d2d66deb12545efa3585702f7ee0beb28b8c23e17f2429469b7cf8722d82a
                                                                          • Opcode Fuzzy Hash: b1434bfbf1b0534d2663c8637ca4983eca7f8b7174a955a4e428453c0505df9c
                                                                          • Instruction Fuzzy Hash: C6C0127800C240DBCB405F64C4AA1573FB4BF1620070001E1D85D5D0668E224400DFB5
                                                                          Memory Dump Source
                                                                          • Source File: 00000009.00000002.1770793265.0000000006E10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06E10000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_9_2_6e10000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: f18431c960a387b66c6054c67a8bf60a086921688b30c5bb030a8456063cbeb2
                                                                          • Instruction ID: 96c08d6feddabce255bc6c062d0a935c30e29aeebec1ffcff1a7369b6681081e
                                                                          • Opcode Fuzzy Hash: f18431c960a387b66c6054c67a8bf60a086921688b30c5bb030a8456063cbeb2
                                                                          • Instruction Fuzzy Hash: E7B012FA54024074C94151F08858A895B2137A57147527401E25400016A1610163F21B
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 13a785343bdea7e0e21cdfb9f08bd3a646e9f7ca7b8aa9eaaf7e1aa2f187e178
                                                                          • Instruction ID: be88889d2b9c178acad711bf4113ac5eec25ce466d156df4aa04bd70a4548dff
                                                                          • Opcode Fuzzy Hash: 13a785343bdea7e0e21cdfb9f08bd3a646e9f7ca7b8aa9eaaf7e1aa2f187e178
                                                                          • Instruction Fuzzy Hash: 57619F34B402059FDB19EF78D99866E7BF2FF88314B104A29E00ADB7A5DF349C058B81
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 234849c41f94a372a6afc16c2ceea5c2aa9ac7d5854d0b1c20b09d84c7cb44c4
                                                                          • Instruction ID: 9b85264e2e8299f3c6e9db4d2ae48dde0bff9edff1e355a828060eb7461f3cd2
                                                                          • Opcode Fuzzy Hash: 234849c41f94a372a6afc16c2ceea5c2aa9ac7d5854d0b1c20b09d84c7cb44c4
                                                                          • Instruction Fuzzy Hash: 9E417C34A406058FCB19FF78E6985AE7FE6FF943147004E28D00A9B698EF3898458B80
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 94de7c0614fae42dc58675e1cd0d39ada02f4694d8b3f942ce177d282348cb26
                                                                          • Instruction ID: b6a4432fd5f90d51cd7258179217fa425b1a198da7de2db27dac576b4ae8cdf7
                                                                          • Opcode Fuzzy Hash: 94de7c0614fae42dc58675e1cd0d39ada02f4694d8b3f942ce177d282348cb26
                                                                          • Instruction Fuzzy Hash: C231DD34B001059FDB44AB79C954B6E7BF2BF89710F2048A8E146EF3A6CA71DC019791
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 41f2bd2cbb4ed89ebf097629476f36461d019b7a6d517e558579759aa8df3ebc
                                                                          • Instruction ID: 2b65c19eaf9a6c75e8e9baf18ab51268bcf55586e2136d31721afa23a8da38b4
                                                                          • Opcode Fuzzy Hash: 41f2bd2cbb4ed89ebf097629476f36461d019b7a6d517e558579759aa8df3ebc
                                                                          • Instruction Fuzzy Hash: 5021C971F003059FDB44ABBD495836FBAEAEFC5210B148829D04AD7355DD348C0647A5
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: d46529e6f75c15e3fb3b510b1c7b6e796866ea62e2d7b82a66ed4632e7adb6c0
                                                                          • Instruction ID: 3f890e0e57e234832dfe5680319995d22f3dbe53a623b384810d7b51441c01cc
                                                                          • Opcode Fuzzy Hash: d46529e6f75c15e3fb3b510b1c7b6e796866ea62e2d7b82a66ed4632e7adb6c0
                                                                          • Instruction Fuzzy Hash: 5C319F34A003099FCB02EFB8DA546ADBBB6FF89304F104A69D009AB358DB359A45CB51
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: 431f89e6e6e67759c70b9572e0b1d0ed60ba9d6149fa565dae160e7cfb827cb7
                                                                          • Instruction ID: 90f18adb03121a0b1b7d9d2b822167e17aab712c1bfdedfef6e95811950fe906
                                                                          • Opcode Fuzzy Hash: 431f89e6e6e67759c70b9572e0b1d0ed60ba9d6149fa565dae160e7cfb827cb7
                                                                          • Instruction Fuzzy Hash: B5218074E00209DFCB01EBB8DA44AADBBB6FF98304F104A69D009A7358DB359A85CF51
                                                                          Memory Dump Source
                                                                          • Source File: 0000000D.00000002.1779989712.0000000002960000.00000040.00000800.00020000.00000000.sdmp, Offset: 02960000, based on PE: false
                                                                          Joe Sandbox IDA Plugin
                                                                          • Snapshot File: hcaresult_13_2_2960000_TWmzcmqkuotC.jbxd
                                                                          Similarity
                                                                          • API ID:
                                                                          • String ID:
                                                                          • API String ID:
                                                                          • Opcode ID: acc41fed9aabef39e080fd415e9c2e9fffa0d8f30d6e8ade0dad9d88fa317d6e
                                                                          • Instruction ID: 719644caf00831180d6468728d4b13b167d5d3db1baa866ae6b5c224d78ea916
                                                                          • Opcode Fuzzy Hash: acc41fed9aabef39e080fd415e9c2e9fffa0d8f30d6e8ade0dad9d88fa317d6e
                                                                          • Instruction Fuzzy Hash: 91118E32B40B105BDB18BF7D845817E7AE6BF842203104E3DD02A9B2E4EF74DC0A4B95