Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
NI0Y4iB1ON.exe

Overview

General Information

Sample name:NI0Y4iB1ON.exe
renamed because original name is a hash value
Original sample name:375e9acde29beee941aa2706285f34b1.exe
Analysis ID:1465053
MD5:375e9acde29beee941aa2706285f34b1
SHA1:e4beb794991712982a6ef02fb41b59b7eb82b202
SHA256:b2a4a9e9cd0fbce0d8bb0e6d7bd34aacca346ad20e0835064366a557bba2e20b
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
Allocates memory in foreign processes
C2 URLs / IPs found in malware configuration
Drops PE files to the document folder of the user
Drops large PE files
Injects a PE file into a foreign processes
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Compiles C# or VB.Net code
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Internet Provider seen in connection with other malware
Launches processes in debugging mode, may be used to hinder debugging
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • NI0Y4iB1ON.exe (PID: 6600 cmdline: "C:\Users\user\Desktop\NI0Y4iB1ON.exe" MD5: 375E9ACDE29BEEE941AA2706285F34B1)
    • csc.exe (PID: 1196 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" MD5: EB80BB1CA9B9C7F516FF69AFCFD75B7D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": "5.161.190.139:8732", "Authorization Header": "249e1ece2f90b39d9c5563282076f21f"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: NI0Y4iB1ON.exe PID: 6600JoeSecurity_RedLineYara detected RedLine StealerJoe Security
              Click to see the 2 entries
              SourceRuleDescriptionAuthorStrings
              0.2.NI0Y4iB1ON.exe.75ba92.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                0.2.NI0Y4iB1ON.exe.75ba92.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  2.2.csc.exe.5200000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                    0.2.NI0Y4iB1ON.exe.5150000.2.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                      0.2.NI0Y4iB1ON.exe.400000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security

                        System Summary

                        barindex
                        Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\Documents\OTOTOTOT\TITUIFO.exe, EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\NI0Y4iB1ON.exe, ProcessId: 6600, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\kooo
                        Timestamp:07/01/24-08:47:32.504841
                        SID:2046045
                        Source Port:49737
                        Destination Port:8732
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:07/01/24-08:47:39.139186
                        SID:2046056
                        Source Port:8732
                        Destination Port:49737
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:07/01/24-08:47:46.398128
                        SID:2043231
                        Source Port:49737
                        Destination Port:8732
                        Protocol:TCP
                        Classtype:A Network Trojan was detected
                        Timestamp:07/01/24-08:47:32.607724
                        SID:2043234
                        Source Port:8732
                        Destination Port:49737
                        Protocol:TCP
                        Classtype:A Network Trojan was detected

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: NI0Y4iB1ON.exeAvira: detected
                        Source: C:\Users\user\Documents\OTOTOTOT\TITUIFO.exeAvira: detection malicious, Label: TR/Dropper.Gen2
                        Source: 0.2.NI0Y4iB1ON.exe.400000.0.unpackMalware Configuration Extractor: RedLine {"C2 url": "5.161.190.139:8732", "Authorization Header": "249e1ece2f90b39d9c5563282076f21f"}
                        Source: NI0Y4iB1ON.exeReversingLabs: Detection: 39%
                        Source: NI0Y4iB1ON.exeVirustotal: Detection: 47%Perma Link
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

                        Compliance

                        barindex
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeUnpacked PE file: 0.2.NI0Y4iB1ON.exe.5150000.2.unpack
                        Source: NI0Y4iB1ON.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: NI0Y4iB1ON.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                        Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: NI0Y4iB1ON.exe, TITUIFO.exe.0.dr

                        Networking

                        barindex
                        Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.4:49737 -> 5.161.190.139:8732
                        Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.4:49737 -> 5.161.190.139:8732
                        Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 5.161.190.139:8732 -> 192.168.2.4:49737
                        Source: TrafficSnort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 5.161.190.139:8732 -> 192.168.2.4:49737
                        Source: Malware configuration extractorURLs: 5.161.190.139:8732
                        Source: global trafficTCP traffic: 192.168.2.4:49737 -> 5.161.190.139:8732
                        Source: Joe Sandbox ViewASN Name: HETZNER-ASDE HETZNER-ASDE
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: unknownTCP traffic detected without corresponding DNS query: 5.161.190.139
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                        Source: csc.exe, 00000002.00000002.2161332834.00000000075A7000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                        Source: csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                        Source: csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                        Source: NI0Y4iB1ON.exe, NI0Y4iB1ON.exe, 00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmp, NI0Y4iB1ON.exe, 00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                        Source: csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                        Source: csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico

                        System Summary

                        barindex
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeFile dump: TITUIFO.exe.0.dr 953255531Jump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_057ADC742_2_057ADC74
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098F69482_2_098F6948
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098F8D282_2_098F8D28
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098F8D182_2_098F8D18
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098F001B2_2_098F001B
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098F00402_2_098F0040
                        Source: NI0Y4iB1ON.exeBinary or memory string: OriginalFilename vs NI0Y4iB1ON.exe
                        Source: NI0Y4iB1ON.exe, 00000000.00000002.1900709118.0000000005194000.00000040.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameThalian.exe8 vs NI0Y4iB1ON.exe
                        Source: NI0Y4iB1ON.exe, 00000000.00000002.1900270000.000000000078E000.00000040.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameThalian.exe8 vs NI0Y4iB1ON.exe
                        Source: NI0Y4iB1ON.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/2@0/1
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeFile created: C:\Users\user\Documents\OTOTOTOTJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMutant created: NULL
                        Source: NI0Y4iB1ON.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: csc.exe, 00000002.00000002.2161332834.000000000786C000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.000000000787A000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                        Source: NI0Y4iB1ON.exeReversingLabs: Detection: 39%
                        Source: NI0Y4iB1ON.exeVirustotal: Detection: 47%
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeFile read: C:\Users\user\Desktop\NI0Y4iB1ON.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\NI0Y4iB1ON.exe "C:\Users\user\Desktop\NI0Y4iB1ON.exe"
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeSection loaded: k7rn7l32.dllJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeSection loaded: ntd3ll.dllJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mscoree.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: version.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: profapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rsaenh.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: cryptbase.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dwrite.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: mswsock.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: secur32.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: wbemcomn.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: amsi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: dpapi.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: rstrtmgr.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ncrypt.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: ntasn1.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeSection loaded: windowscodecs.dllJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32Jump to behavior
                        Source: NI0Y4iB1ON.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                        Source: NI0Y4iB1ON.exeStatic file information: File size 4686848 > 1048576
                        Source: NI0Y4iB1ON.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x297400
                        Source: NI0Y4iB1ON.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x129800
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                        Source: NI0Y4iB1ON.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                        Source: NI0Y4iB1ON.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                        Source: Binary string: C:\ReleaseAI\win\Release\stubs\x86\ExternalUi.pdb source: NI0Y4iB1ON.exe, TITUIFO.exe.0.dr

                        Data Obfuscation

                        barindex
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeUnpacked PE file: 0.2.NI0Y4iB1ON.exe.5150000.2.unpack
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: NI0Y4iB1ON.exeStatic PE information: section name: .didat
                        Source: TITUIFO.exe.0.drStatic PE information: section name: .didat
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeCode function: 2_2_098FD912 push eax; ret 2_2_098FD921

                        Persistence and Installation Behavior

                        barindex
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeFile created: C:\Users\user\Documents\OTOTOTOT\TITUIFO.exeJump to dropped file
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeFile created: C:\Users\user\Documents\OTOTOTOT\TITUIFO.exeJump to dropped file
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run koooJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run koooJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 57A0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 72B0000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: 5860000 memory reserve | memory write watchJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 1058Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWindow / User API: threadDelayed 2500Jump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeDropped PE file which has not been started: C:\Users\user\Documents\OTOTOTOT\TITUIFO.exeJump to dropped file
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 2032Thread sleep time: -11990383647911201s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe TID: 6724Thread sleep time: -922337203685477s >= -30000sJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeThread delayed: delay time: 922337203685477Jump to behavior
                        Source: csc.exe, 00000002.00000002.2159730888.0000000005492000.00000004.00000020.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2153885572.0000000005492000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeProcess token adjusted: DebugJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeMemory allocated: page read and write | page guardJump to behavior

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5200000 protect: page execute and read and writeJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5200000 value starts with: 4D5AJump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 5200000Jump to behavior
                        Source: C:\Users\user\Desktop\NI0Y4iB1ON.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe base: 4F0E008Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                        Source: csc.exe, 00000002.00000003.2129924299.000000000B858000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.75ba92.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.75ba92.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.csc.exe.5200000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.5150000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NI0Y4iB1ON.exe PID: 6600, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1196, type: MEMORYSTR
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                        Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                        Source: Yara matchFile source: 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1196, type: MEMORYSTR

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: dump.pcap, type: PCAP
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.75ba92.1.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.75ba92.1.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 2.2.csc.exe.5200000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.5150000.2.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 0.2.NI0Y4iB1ON.exe.400000.0.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: Process Memory Space: NI0Y4iB1ON.exe PID: 6600, type: MEMORYSTR
                        Source: Yara matchFile source: Process Memory Space: csc.exe PID: 1196, type: MEMORYSTR
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                        Windows Management Instrumentation
                        1
                        Registry Run Keys / Startup Folder
                        31
                        Process Injection
                        1
                        Masquerading
                        1
                        OS Credential Dumping
                        231
                        Security Software Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/Job1
                        DLL Side-Loading
                        1
                        Registry Run Keys / Startup Folder
                        11
                        Disable or Modify Tools
                        LSASS Memory1
                        Process Discovery
                        Remote Desktop Protocol2
                        Data from Local System
                        1
                        Non-Standard Port
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        DLL Side-Loading
                        241
                        Virtualization/Sandbox Evasion
                        Security Account Manager241
                        Virtualization/Sandbox Evasion
                        SMB/Windows Admin SharesData from Network Shared Drive1
                        Application Layer Protocol
                        Automated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook31
                        Process Injection
                        NTDS1
                        Application Window Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                        Obfuscated Files or Information
                        LSA Secrets113
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        Software Packing
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                        DLL Side-Loading
                        DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        NI0Y4iB1ON.exe39%ReversingLabsWin32.Spyware.RedLine
                        NI0Y4iB1ON.exe47%VirustotalBrowse
                        NI0Y4iB1ON.exe100%AviraTR/Dropper.Gen2
                        SourceDetectionScannerLabelLink
                        C:\Users\user\Documents\OTOTOTOT\TITUIFO.exe100%AviraTR/Dropper.Gen2
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://tempuri.org/0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                        https://api.ip.sb/ip0%URL Reputationsafe
                        https://www.ecosia.org/newtab/0%URL Reputationsafe
                        http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                        http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                        https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                        https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id14ResponseD0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                        https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%VirustotalBrowse
                        http://tempuri.org/Entity/Id14ResponseD2%VirustotalBrowse
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%VirustotalBrowse
                        http://tempuri.org/Entity/Id23ResponseD1%VirustotalBrowse
                        http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%VirustotalBrowse
                        http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                        https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                        http://tempuri.org/Entity/Id12Response2%VirustotalBrowse
                        http://tempuri.org/Entity/Id2Response2%VirustotalBrowse
                        http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%VirustotalBrowse
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6ResponseD0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id21Response4%VirustotalBrowse
                        http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%VirustotalBrowse
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%VirustotalBrowse
                        http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id93%VirustotalBrowse
                        http://tempuri.org/Entity/Id81%VirustotalBrowse
                        http://tempuri.org/Entity/Id6ResponseD1%VirustotalBrowse
                        http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%VirustotalBrowse
                        http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id51%VirustotalBrowse
                        http://tempuri.org/Entity/Id41%VirustotalBrowse
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id61%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id71%VirustotalBrowse
                        http://tempuri.org/Entity/Id13ResponseD0%Avira URL Cloudsafe
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%VirustotalBrowse
                        http://tempuri.org/Entity/Id19Response2%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%VirustotalBrowse
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id13ResponseD1%VirustotalBrowse
                        http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id5ResponseD0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wsat0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id15Response2%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id6Response2%VirustotalBrowse
                        http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id1ResponseD1%VirustotalBrowse
                        http://schemas.xmlsoap.org/ws/2004/04/sc0%VirustotalBrowse
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%VirustotalBrowse
                        http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                        http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%VirustotalBrowse
                        http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id1Response0%Avira URL Cloudsafe
                        http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%Avira URL Cloudsafe
                        No contacted domains info
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/sctcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/chrome_newtabcsc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/ac/?q=csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id14ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id23ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinarycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id12Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id2Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 4%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id9csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 3%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id8csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id5csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id4csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id7csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id19Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id13ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/faultcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsatcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id5ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renewcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registercsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id6Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 2%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        https://api.ip.sb/ipNI0Y4iB1ON.exe, NI0Y4iB1ON.exe, 00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmp, NI0Y4iB1ON.exe, 00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/sccsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id1ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id9Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id20csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id22csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id23csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id24csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id24Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        https://www.ecosia.org/newtab/csc.exe, 00000002.00000003.2131906888.000000000842A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008608000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083EF000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.0000000008381000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008361000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008624000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008559000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000839D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008597000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000857D000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.0000000008461000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2125394511.0000000008575000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2131906888.000000000840E000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000084EE000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000850A000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.00000000083D4000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000003.2127187764.000000000847D000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id1Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedcsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Replaycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegocsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binarycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id21ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/08/addressingcsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wsat/Completioncsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trustcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id10csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id11csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id10ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id12csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id16Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id13csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id14csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id16csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Noncecsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id17csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id18csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id5Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id19csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnscsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id15ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id10Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/02/trust/Renewcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id11ResponseDcsc.exe, 00000002.00000002.2161332834.00000000075A7000.00000004.00000800.00020000.00000000.sdmp, csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id8Responsecsc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0csc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/ws/2006/02/addressingidentitycsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://tempuri.org/Entity/Id17ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://schemas.xmlsoap.org/soap/envelope/csc.exe, 00000002.00000002.2161332834.00000000072B1000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://tempuri.org/Entity/Id8ResponseDcsc.exe, 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        5.161.190.139
                        unknownGermany
                        24940HETZNER-ASDEtrue
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1465053
                        Start date and time:2024-07-01 08:46:07 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 6m 58s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:6
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:NI0Y4iB1ON.exe
                        renamed because original name is a hash value
                        Original Sample Name:375e9acde29beee941aa2706285f34b1.exe
                        Detection:MAL
                        Classification:mal100.troj.spyw.evad.winEXE@3/2@0/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:
                        • Successful, ratio: 74%
                        • Number of executed functions: 18
                        • Number of non-executed functions: 3
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target NI0Y4iB1ON.exe, PID 6600 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtProtectVirtualMemory calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        TimeTypeDescription
                        02:47:43API Interceptor19x Sleep call for process: csc.exe modified
                        07:47:22AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run kooo C:\Users\user\Documents\OTOTOTOT\TITUIFO.exe
                        07:47:30AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run kooo C:\Users\user\Documents\OTOTOTOT\TITUIFO.exe
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        5.161.190.1399E56BC168EFC43001C19A1720891C88FA4CEFB2057B0B.exeGet hashmaliciousRedLineBrowse
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          HETZNER-ASDEhttps://www.teamviewer.com/en-in/download/windows/Get hashmaliciousUnknownBrowse
                          • 144.76.236.241
                          https://he110ca11he1lpn0wwb112.pages.dev/Get hashmaliciousTechSupportScamBrowse
                          • 195.201.57.90
                          https://serviceca11he1pn0waa12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                          • 195.201.57.90
                          https://u.to/NuS5IAGet hashmaliciousUnknownBrowse
                          • 94.130.141.49
                          botx.x86.elfGet hashmaliciousMiraiBrowse
                          • 135.181.82.247
                          vjYcExA6ou.exeGet hashmaliciousPureLog Stealer, VidarBrowse
                          • 195.201.251.214
                          _$phantom-SCV.cmdGet hashmaliciousUnknownBrowse
                          • 144.76.71.93
                          Evo Resou_nls..scr.exeGet hashmaliciousAsyncRATBrowse
                          • 49.12.202.237
                          https://he110ca11he1lpn0wwb112.pages.dev/Get hashmaliciousTechSupportScamBrowse
                          • 195.201.57.90
                          https://serviceca11he1pn0waa12.pages.dev/Get hashmaliciousTechSupportScamBrowse
                          • 195.201.57.90
                          No context
                          No context
                          Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):3094
                          Entropy (8bit):5.33145931749415
                          Encrypted:false
                          SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                          MD5:3FD5C0634443FB2EF2796B9636159CB6
                          SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                          SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                          SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                          Malicious:false
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                          Process:C:\Users\user\Desktop\NI0Y4iB1ON.exe
                          File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Category:dropped
                          Size (bytes):953255531
                          Entropy (8bit):0.06579742896447444
                          Encrypted:false
                          SSDEEP:
                          MD5:44B7D1F5510DBF3BEB498D5A75392E83
                          SHA1:3D703E1225B0374094D9FCE60EEA6F62BE17EB91
                          SHA-256:AB899360300CB48AC4FEB96681F411A685823E1B632D265ECAF651789150A43E
                          SHA-512:465E1EAF9CF692248CBFC5483B9153C668DE5DBD6000238EABC483C0874A20A33ADF8D8EE204D0E25861654130246A760483255A0B6BA29FD67242F585E089EB
                          Malicious:true
                          Antivirus:
                          • Antivirus: Avira, Detection: 100%
                          Reputation:low
                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y............~j......~j........................~j.....~j.....~j.....~j........O......).... .....H..........Rich....................PE..L.....e.........."....&.t)........... .......)...@..........................PH.......G...@...... ............................4.<.....5.[............i...)....=.$.......p...................@.........+.@.............). .....4.@....................text.....)......t)................. ..`.rdata...@....)..8...x).............@..@.data.........4..4....4.............@....didat........5.......4.............@....rsrc...[.....5.......4.............@..@................................................................................................................................................................................................................................................................................
                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                          Entropy (8bit):6.476570625780272
                          TrID:
                          • Win32 Executable (generic) a (10002005/4) 99.96%
                          • Generic Win/DOS Executable (2004/3) 0.02%
                          • DOS Executable Generic (2002/1) 0.02%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:NI0Y4iB1ON.exe
                          File size:4'686'848 bytes
                          MD5:375e9acde29beee941aa2706285f34b1
                          SHA1:e4beb794991712982a6ef02fb41b59b7eb82b202
                          SHA256:b2a4a9e9cd0fbce0d8bb0e6d7bd34aacca346ad20e0835064366a557bba2e20b
                          SHA512:4d376813cb1ede9ad20cac49a8ad8bc83dfaefd13e1326f7710fa357e9c636446c19684641ecf16eaf0e73283895a3fe7fd29fdb12c1f60065d7c9810d256597
                          SSDEEP:98304:ZWFsTuRN2zazBLlLvOc1Pgd1Ea0fzsFvOFLyf:ZWFsTuRN2zahf1Y7Efy
                          TLSH:45262820325E8D2FD59128F1962897B7911CAD2B0B61A0D7B68C7E5F27710C70BF7E1A
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..............~j......~j..............................~j......~j......~j......~j..........O.......)..... .......H............
                          Icon Hash:c338dad2da985006
                          Entrypoint:0x60c1a0
                          Entrypoint Section:.text
                          Digitally signed:true
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, GUARD_CF, TERMINAL_SERVER_AWARE
                          Time Stamp:0x65AFEAC5 [Tue Jan 23 16:35:17 2024 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:36aca8edddb161c588fcf5afdc1ad9fa
                          Signature Valid:
                          Signature Issuer:
                          Signature Validation Error:
                          Error Number:
                          Not Before, Not After
                            Subject Chain
                              Version:
                              Thumbprint MD5:
                              Thumbprint SHA-1:
                              Thumbprint SHA-256:
                              Serial:
                              Instruction
                              call 00007F65647D8A2Bh
                              jmp 00007F65647D826Dh
                              push ebp
                              mov ebp, esp
                              and dword ptr [00750BACh], 00000000h
                              sub esp, 24h
                              or dword ptr [0074D020h], 01h
                              push 0000000Ah
                              call dword ptr [00699268h]
                              test eax, eax
                              je 00007F65647D85A2h
                              and dword ptr [ebp-10h], 00000000h
                              xor eax, eax
                              push ebx
                              push esi
                              push edi
                              xor ecx, ecx
                              lea edi, dword ptr [ebp-24h]
                              push ebx
                              cpuid
                              mov esi, ebx
                              pop ebx
                              nop
                              mov dword ptr [edi], eax
                              mov dword ptr [edi+04h], esi
                              mov dword ptr [edi+08h], ecx
                              xor ecx, ecx
                              mov dword ptr [edi+0Ch], edx
                              mov eax, dword ptr [ebp-24h]
                              mov edi, dword ptr [ebp-20h]
                              mov dword ptr [ebp-0Ch], eax
                              xor edi, 756E6547h
                              mov eax, dword ptr [ebp-18h]
                              xor eax, 49656E69h
                              mov dword ptr [ebp-04h], eax
                              mov eax, dword ptr [ebp-1Ch]
                              xor eax, 6C65746Eh
                              mov dword ptr [ebp-08h], eax
                              xor eax, eax
                              inc eax
                              push ebx
                              cpuid
                              mov esi, ebx
                              pop ebx
                              nop
                              lea ebx, dword ptr [ebp-24h]
                              mov dword ptr [ebx], eax
                              mov eax, dword ptr [ebp-04h]
                              or eax, dword ptr [ebp-08h]
                              or eax, edi
                              mov dword ptr [ebx+04h], esi
                              mov dword ptr [ebx+08h], ecx
                              mov dword ptr [ebx+0Ch], edx
                              jne 00007F65647D8435h
                              mov eax, dword ptr [ebp-24h]
                              and eax, 0FFF3FF0h
                              cmp eax, 000106C0h
                              je 00007F65647D8415h
                              cmp eax, 00020660h
                              je 00007F65647D840Eh
                              cmp eax, 00020670h
                              je 00007F65647D8407h
                              cmp eax, 00030650h
                              je 00007F65647D8400h
                              cmp eax, 00030660h
                              je 00007F65647D83F9h
                              cmp eax, 00030670h
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x34b5180x3c.rdata
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x35b0000x12965b.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x8069080x29b8
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x3de0000x2d824.rsrc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x2ed3b00x70.rdata
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x2ed4400x18.rdata
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x2beb000x40.rdata
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x2990000x320.rdata
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x3488040x240.rdata
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x2980000x29740057da8830c31be32bc33e4e134aa599faunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rdata0x2990000xb40000xb38004f9d26185e37b65035edbc1141b2007eFalse0.32706411037604455data5.068944901847019IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .data0x34d0000xd0000x3400e98ea88d23706ee22313e0c4a05673edFalse0.2342247596153846data4.472160620433143IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .didat0x35a0000x10000x800024099aaf5ddf68616b817cf9ff2cd48False0.4072265625data4.513561592019692IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x35b0000x12965b0x1298007cf64a4b1d83d73c8b57c1f9cea01194False0.30150341386554624data6.117507832819866IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_BITMAP0x35ba5c0x4a436PC bitmap, Windows 3.x format, 38982 x 2 x 52, image size 304445, cbSize 304182, bits offset 540.49700179497800656
                              RT_BITMAP0x3a5e940x13eDevice independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 5 important colorsEnglishUnited States0.25471698113207547
                              RT_BITMAP0x3a5fd40x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.03017241379310345
                              RT_BITMAP0x3a67fc0x48a8Device independent bitmap graphic, 290 x 16 x 32, image size 0EnglishUnited States0.11881720430107527
                              RT_BITMAP0x3ab0a40xa6aDevice independent bitmap graphic, 320 x 16 x 4, image size 2562, resolution 2834 x 2834 px/mEnglishUnited States0.21680420105026257
                              RT_BITMAP0x3abb100x152Device independent bitmap graphic, 32 x 16 x 4, image size 258, resolution 2834 x 2834 px/m, 10 important colorsEnglishUnited States0.5295857988165681
                              RT_BITMAP0x3abc640x828Device independent bitmap graphic, 32 x 16 x 32, image size 0EnglishUnited States0.4875478927203065
                              RT_ICON0x3ac48c0xb4bdPC bitmap, Windows 3.x format, 6396 x 2 x 51, image size 47160, cbSize 46269, bits offset 540.48287190127299057
                              RT_ICON0x3b794c0x6c3dPC bitmap, Windows 3.x format, 4011 x 2 x 52, image size 28203, cbSize 27709, bits offset 540.5219242845284926
                              RT_ICON0x3be58c0x99c9PC bitmap, Windows 3.x format, 5428 x 2 x 46, image size 39539, cbSize 39369, bits offset 540.4305417968452336
                              RT_ICON0x3c7f580x41b89PC bitmap, Windows 3.x format, 34018 x 2 x 35, image size 269636, cbSize 269193, bits offset 540.49671053853554886
                              RT_ICON0x409ae40x42028Device independent bitmap graphic, 256 x 512 x 32, image size 262144, resolution 2835 x 2835 px/mEnglishUnited States0.016724857235849336
                              RT_ICON0x44bb0c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/mEnglishUnited States0.2624113475177305
                              RT_ICON0x44bf740x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/mEnglishUnited States0.08153526970954357
                              RT_ICON0x44e51c0x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/mEnglishUnited States0.12312382739212008
                              RT_ICON0x44f5c40x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.3262411347517731
                              RT_ICON0x44fa2c0x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/mEnglishUnited States0.030078078788595766
                              RT_ICON0x4602540x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/mEnglishUnited States0.05922295701464336
                              RT_DIALOG0x46447c0xacdataEnglishUnited States0.7151162790697675
                              RT_DIALOG0x4645280xccdataEnglishUnited States0.6911764705882353
                              RT_DIALOG0x4645f40x1b4dataEnglishUnited States0.5458715596330275
                              RT_DIALOG0x4647a80x136dataEnglishUnited States0.6064516129032258
                              RT_DIALOG0x4648e00x4cdataEnglishUnited States0.8289473684210527
                              RT_STRING0x46492c0x234dataEnglishUnited States0.4645390070921986
                              RT_STRING0x464b600x182dataEnglishUnited States0.5103626943005182
                              RT_STRING0x464ce40x50dataEnglishUnited States0.7375
                              RT_STRING0x464d340x9adataEnglishUnited States0.37662337662337664
                              RT_STRING0x464dd00x2f6dataEnglishUnited States0.449868073878628
                              RT_STRING0x4650c80x5c0dataEnglishUnited States0.3498641304347826
                              RT_STRING0x4656880x434dataEnglishUnited States0.32899628252788105
                              RT_STRING0x465abc0x100dataEnglishUnited States0.5703125
                              RT_STRING0x465bbc0x484dataEnglishUnited States0.39186851211072665
                              RT_STRING0x4660400x1eadataEnglishUnited States0.44081632653061226
                              RT_STRING0x46622c0x18adataEnglishUnited States0.5228426395939086
                              RT_STRING0x4663b80x216Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishUnited States0.46254681647940077
                              RT_STRING0x4665d00x624dataEnglishUnited States0.3575063613231552
                              RT_STRING0x466bf40x660dataEnglishUnited States0.3474264705882353
                              RT_STRING0x4672540x396dataEnglishUnited States0.3867102396514161
                              RT_GROUP_ICON0x4675ec0x5adataEnglishUnited States0.7444444444444445
                              RT_HTML0x4676480x3835ASCII text, with very long lines (443), with CRLF line terminatorsEnglishUnited States0.08298005420807561
                              RT_HTML0x46ae800x1316ASCII text, with CRLF line terminatorsEnglishUnited States0.18399508800654932
                              RT_HTML0x46c1980x8c77HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.08081426068578103
                              RT_HTML0x474e100x6acdHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10679931238798873
                              RT_HTML0x47b8e00x6a2HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.3486454652532391
                              RT_HTML0x47bf840x104aHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.2170263788968825
                              RT_HTML0x47cfd00x15b1HTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.17612101566720692
                              RT_HTML0x47e5840x205cexported SGML document, ASCII text, with very long lines (659), with CRLF line terminatorsEnglishUnited States0.13604538870111058
                              RT_HTML0x4805e00x368dHTML document, ASCII text, with CRLF line terminatorsEnglishUnited States0.10834228428213391
                              RT_HTML0x483c700x1d7ASCII text, with CRLF line terminatorsEnglishUnited States0.6008492569002123
                              RT_MANIFEST0x483e480x813XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.41025641025641024
                              DLLImport
                              KERNEL32.dllWriteFile, DeleteFileW, HeapDestroy, HeapSize, HeapReAlloc, HeapFree, HeapAlloc, GetProcessHeap, SizeofResource, LockResource, LoadResource, FindResourceW, FindResourceExW, CreateEventExW, WaitForSingleObject, CreateProcessW, GetLastError, GetExitCodeProcess, SetEvent, RemoveDirectoryW, GetProcAddress, GetModuleHandleW, GetWindowsDirectoryW, CreateDirectoryW, GetTempPathW, GetTempFileNameW, MoveFileW, EnterCriticalSection, LeaveCriticalSection, GetModuleFileNameW, DeleteCriticalSection, InitializeCriticalSectionAndSpinCount, GetCurrentThreadId, RaiseException, SetLastError, GlobalUnlock, GlobalLock, GlobalAlloc, MulDiv, lstrcmpW, CreateEventW, FindClose, FindFirstFileW, GetFullPathNameW, InitializeCriticalSection, lstrcpynW, CreateThread, LoadLibraryExW, GetCurrentProcess, Sleep, WideCharToMultiByte, GetDiskFreeSpaceExW, DecodePointer, GetExitCodeThread, GetCurrentProcessId, FreeLibrary, GetSystemDirectoryW, lstrlenW, VerifyVersionInfoW, VerSetConditionMask, lstrcmpiW, LoadLibraryW, GetDriveTypeW, CompareStringW, FindNextFileW, GetLogicalDriveStringsW, GetFileSize, GetFileAttributesW, GetShortPathNameW, GetFinalPathNameByHandleW, SetFileAttributesW, GetFileTime, CopyFileW, ReadFile, SetFilePointer, SetFileTime, SystemTimeToFileTime, MultiByteToWideChar, GetSystemInfo, WaitForMultipleObjects, GetVersionExW, CreateSemaphoreW, ReleaseSemaphore, GlobalMemoryStatus, GetModuleHandleA, GetProcessAffinityMask, VirtualProtect, VirtualQuery, LoadLibraryExA, GetStringTypeW, LocalFree, LocalAlloc, SetUnhandledExceptionFilter, FileTimeToSystemTime, GetEnvironmentVariableW, GetSystemTime, GetDateFormatW, GetTimeFormatW, GetLocaleInfoW, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetEnvironmentStringsW, InitializeCriticalSectionEx, CloseHandle, GetModuleFileNameA, GetCurrentThread, GetConsoleOutputCP, FlushFileBuffers, Wow64DisableWow64FsRedirection, Wow64RevertWow64FsRedirection, IsWow64Process, SetConsoleTextAttribute, GetStdHandle, GetConsoleScreenBufferInfo, OutputDebugStringW, GetTickCount, GetCommandLineW, SetCurrentDirectoryW, SetEndOfFile, EnumResourceLanguagesW, GetSystemDefaultLangID, GetUserDefaultLangID, GetLocalTime, ResetEvent, GlobalFree, GetPrivateProfileStringW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, CreateNamedPipeW, ConnectNamedPipe, TerminateThread, CompareFileTime, CopyFileExW, OpenEventW, PeekNamedPipe, WaitForSingleObjectEx, QueryPerformanceCounter, QueryPerformanceFrequency, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, WakeAllConditionVariable, SleepConditionVariableSRW, EncodePointer, LCMapStringEx, CompareStringEx, GetCPInfo, GetSystemTimeAsFileTime, IsDebuggerPresent, InitializeSListHead, InterlockedPopEntrySList, InterlockedPushEntrySList, FlushInstructionCache, IsProcessorFeaturePresent, VirtualAlloc, VirtualFree, UnhandledExceptionFilter, TerminateProcess, GetStartupInfoW, RtlUnwind, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, ExitProcess, GetFileType, LCMapStringW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleMode, GetFileSizeEx, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, FreeEnvironmentStringsW, SetEnvironmentVariableW, SetStdHandle, ReadConsoleW, WriteConsoleW, LoadLibraryA, CreateFileW
                              imagehlp.dllSymGetModuleBase, SymFunctionTableAccess, SymGetLineFromAddr, SymSetSearchPath, SymCleanup, SymInitialize, SymSetOptions, StackWalk
                              Language of compilation systemCountry where language is spokenMap
                              EnglishUnited States
                              TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                              07/01/24-08:47:32.504841TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)497378732192.168.2.45.161.190.139
                              07/01/24-08:47:39.139186TCP2046056ET TROJAN Redline Stealer/MetaStealer Family Activity (Response)8732497375.161.190.139192.168.2.4
                              07/01/24-08:47:46.398128TCP2043231ET TROJAN Redline Stealer TCP CnC Activity497378732192.168.2.45.161.190.139
                              07/01/24-08:47:32.607724TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response8732497375.161.190.139192.168.2.4
                              TimestampSource PortDest PortSource IPDest IP
                              Jul 1, 2024 08:47:30.910645008 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:30.915456057 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:30.917887926 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:31.266604900 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:31.272547960 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:31.385631084 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:31.435139894 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:32.504841089 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:32.509671926 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:32.607723951 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:32.653928041 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:39.033618927 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:39.038450956 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139185905 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139231920 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139241934 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139251947 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139262915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:39.139283895 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:39.139345884 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:39.185159922 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.006119013 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.011168957 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.110004902 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.124138117 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.128932953 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.226454973 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.245136976 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.252286911 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.350320101 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.371150017 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.376569986 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.474334955 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.485517025 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.490328074 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.588082075 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.590353966 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.595185041 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.692997932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.747628927 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.792191029 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.797164917 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797175884 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797214031 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797223091 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797234058 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:40.797338009 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797405005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.797430038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.802270889 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.802320957 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:40.802329063 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.066373110 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.107034922 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:41.332055092 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:41.336982012 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.434650898 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.443778992 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:41.448586941 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.547449112 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.565918922 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:41.570868969 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.668555975 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:41.716384888 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.146190882 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.151185989 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.249062061 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.256036997 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.260804892 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.358704090 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.388199091 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.393140078 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393151999 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393161058 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393198967 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.393228054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393238068 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393279076 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.393326998 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393337011 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393345118 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393382072 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.393414021 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393424988 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393464088 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.393464088 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.393560886 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.398271084 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398422956 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398432016 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398442030 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398451090 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398648977 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398658037 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398665905 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398674965 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.398684978 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403081894 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403090954 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403106928 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403115034 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403151989 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403161049 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403177023 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403184891 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403197050 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403206110 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403258085 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403265953 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.403289080 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.797054052 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.806741953 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:42.811534882 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.914407969 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:42.966370106 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:43.206640959 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:43.211494923 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:43.309596062 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:43.357012033 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:43.368031979 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:43.372781038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:43.471086025 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:43.528894901 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.618731022 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.623599052 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.623619080 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.623630047 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.730051994 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.779627085 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.864243031 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.864322901 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.864757061 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869196892 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869254112 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869286060 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869343996 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869354010 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869375944 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869395018 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869401932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869445086 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869496107 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869527102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869569063 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869585991 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869612932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869621992 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869631052 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869640112 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869642973 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869651079 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.869667053 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.869693995 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.874054909 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874063015 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874104977 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874114037 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874125957 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.874150991 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.874171972 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.874174118 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874182940 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874228001 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.874254942 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874268055 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874322891 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874331951 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874381065 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874388933 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874470949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874479055 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874483109 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874500990 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874507904 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874516010 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874557018 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874563932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874615908 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874624968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874656916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874665976 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874710083 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.874716997 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878721952 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878731966 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878771067 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878797054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878868103 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878881931 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878926039 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.878933907 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879013062 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879021883 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879061937 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879070044 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879117012 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879177094 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879185915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879246950 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879255056 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879286051 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879293919 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879338026 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879388094 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879396915 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.879414082 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879456997 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.879471064 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879509926 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879518986 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879571915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879580975 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879610062 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879617929 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879663944 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879712105 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879725933 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879734039 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879756927 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879765034 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879833937 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879842997 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879904985 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879914045 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879964113 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.879972935 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880012035 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880075932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880084991 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880093098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880111933 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880120993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880193949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880253077 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880260944 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880269051 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880306959 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880321026 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880373955 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.880382061 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883492947 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883502007 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883536100 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883543968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883594036 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883603096 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883665085 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883675098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883729935 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883738041 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883771896 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883794069 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883853912 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.883862972 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884095907 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.884151936 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.884205103 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884219885 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884238958 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884253979 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884315968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884325027 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884366989 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884376049 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884473085 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884486914 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884507895 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884540081 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884579897 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884588957 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884632111 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884640932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884701967 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884710073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884774923 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884783983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884824038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884860992 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884908915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884917021 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884960890 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.884968996 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885013103 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885021925 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885072947 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885082006 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885097980 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885107040 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885160923 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885169983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885234118 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885243893 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885282993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885291100 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885328054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885380983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885390043 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885401011 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885447025 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885454893 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885574102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885582924 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885617018 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885664940 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885679960 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885689020 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885710955 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885719061 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885757923 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885766983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.885945082 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.886008978 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.888914108 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.888957977 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.888967037 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.888982058 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.888991117 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889031887 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889040947 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889106035 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889115095 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889122963 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889132023 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889189005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889197111 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889247894 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889257908 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889266968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889307976 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889323950 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889332056 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889425993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889435053 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889450073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889458895 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889502048 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889509916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889553070 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889561892 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889609098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889617920 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889668941 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889677048 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889709949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889719009 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889759064 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889766932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889775038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889784098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889816999 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889826059 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889864922 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889873981 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889915943 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889924049 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889949083 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889956951 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889971972 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.889980078 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890024900 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890033007 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890048981 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890062094 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890094995 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890104055 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890113115 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890312910 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.890379906 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.890755892 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890791893 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890799999 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890810013 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890914917 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890923023 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890976906 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.890985966 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891002893 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891011953 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891113043 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891122103 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891130924 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891155005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891163111 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891212940 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891226053 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891233921 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891311884 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891321898 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891330004 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891338110 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891357899 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891366959 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891372919 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891376972 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891422987 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891432047 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891446114 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891453981 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891499043 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891509056 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891518116 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891525984 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891557932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891566992 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891599894 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891627073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891659975 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891669035 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891716957 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891726017 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891732931 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891741991 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891757965 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891767979 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891803980 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891813040 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891828060 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891835928 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891850948 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891860008 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891937971 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.891946077 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.892129898 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.892195940 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.895239115 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895248890 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895339966 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895348072 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895387888 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895435095 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895443916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895451069 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895545959 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895555019 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895562887 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895565987 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895575047 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895653009 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895662069 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895668983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895678997 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895687103 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895703077 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895711899 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895720005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895728111 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895742893 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895750999 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895791054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895800114 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895839930 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895849943 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895867109 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895874977 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895905018 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895914078 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895960093 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895968914 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895983934 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.895992041 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896037102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896045923 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896106958 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896114111 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896153927 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896162033 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896174908 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896183014 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896229029 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896236897 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896245003 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896258116 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896306038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896312952 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896321058 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896328926 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896363974 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896372080 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896565914 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.896627903 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.896934986 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896943092 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896951914 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.896990061 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897034883 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897042990 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897058010 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897069931 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897088051 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897114038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897205114 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897212982 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897219896 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897228003 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897234917 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897243023 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897257090 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897264957 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897273064 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897279978 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897295952 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897304058 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897316933 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897325039 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897346020 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897353888 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897402048 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897409916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897418022 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897425890 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897485018 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897491932 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897536993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897545099 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897553921 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897557020 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897602081 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897609949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897617102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897624016 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897631884 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897639990 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897648096 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897655964 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897713900 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897721052 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897727966 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897736073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897742987 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897752047 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897761106 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897767067 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897773981 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897780895 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.897949934 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.898005009 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.901483059 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901493073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901540041 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901549101 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901618004 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901627064 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901657104 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901664972 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901704073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901711941 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901722908 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901731968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901755095 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901763916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901813984 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901823044 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901885986 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901894093 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901920080 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901927948 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901977062 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.901985884 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902004004 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902012110 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902046919 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902055979 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902116060 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902124882 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902133942 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902142048 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902158022 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902165890 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902180910 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902189016 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902240992 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902249098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902266979 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902276039 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902291059 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902299881 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902313948 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902323008 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902371883 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902379990 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902400970 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902410030 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902443886 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902452946 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902467966 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902477026 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902508974 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902517080 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902559042 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902568102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902693987 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902748108 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.902781010 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902795076 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902803898 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.902822018 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902832031 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902848005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902873993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902884007 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902930975 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902940035 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902947903 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902983904 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.902992964 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903059006 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903067112 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903212070 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903227091 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903306007 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903315067 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903323889 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903386116 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903394938 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903426886 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903434992 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903443098 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903491020 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903508902 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903609991 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903620005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903629065 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903633118 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903683901 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903693914 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903709888 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903717995 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903758049 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903767109 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903786898 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903795958 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903810978 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903821945 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903871059 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903879881 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903897047 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903904915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903985023 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.903994083 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904000998 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904009104 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904023886 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904031038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904059887 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904067993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904148102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.904309988 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:45.907577038 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907665968 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907675982 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907685995 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907701015 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907778978 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907834053 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907911062 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907919884 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907943010 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.907951117 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908000946 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908010006 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908191919 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908200979 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908247948 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908256054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908309937 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908318043 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908332109 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908339977 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908354044 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908360958 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908405066 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908411980 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908422947 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908503056 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908512115 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908518076 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908591032 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908598900 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908607006 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908613920 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908621073 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908627987 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908634901 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908643007 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908724070 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908731937 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908739090 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908741951 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908746004 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908751965 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908760071 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908767939 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908775091 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908782005 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908853054 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908860922 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908868074 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908870935 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908874035 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908880949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.908888102 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909145117 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909152985 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909187078 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909194946 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909243107 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909250975 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909259081 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909311056 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909320116 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909327030 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909354925 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909363031 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909396887 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909404993 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909413099 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909473896 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909482002 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909488916 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909502983 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909512043 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909575939 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909584045 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909637928 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909646034 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909719944 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909728050 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909735918 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909779072 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909818888 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909827948 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:45.909863949 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.294169903 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.294950962 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:46.299772978 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.397349119 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.398128033 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:46.402921915 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.501074076 CEST8732497375.161.190.139192.168.2.4
                              Jul 1, 2024 08:47:46.544504881 CEST497378732192.168.2.45.161.190.139
                              Jul 1, 2024 08:47:46.843913078 CEST497378732192.168.2.45.161.190.139

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:02:47:02
                              Start date:01/07/2024
                              Path:C:\Users\user\Desktop\NI0Y4iB1ON.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\NI0Y4iB1ON.exe"
                              Imagebase:0x400000
                              File size:4'686'848 bytes
                              MD5 hash:375E9ACDE29BEEE941AA2706285F34B1
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1900270000.000000000075B000.00000040.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1900709118.0000000005152000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:02:47:21
                              Start date:01/07/2024
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe"
                              Imagebase:0x9a0000
                              File size:2'141'552 bytes
                              MD5 hash:EB80BB1CA9B9C7F516FF69AFCFD75B7D
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.2156084327.0000000005202000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2161332834.0000000007344000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:moderate
                              Has exited:true

                              Reset < >

                                Execution Graph

                                Execution Coverage:8%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:0%
                                Total number of Nodes:88
                                Total number of Limit Nodes:7
                                execution_graph 29076 57aad38 29079 57aae30 29076->29079 29077 57aad47 29080 57aae41 29079->29080 29081 57aae64 29079->29081 29080->29081 29087 57ab0c8 29080->29087 29091 57ab0b8 29080->29091 29081->29077 29082 57aae5c 29082->29081 29083 57ab068 GetModuleHandleW 29082->29083 29084 57ab095 29083->29084 29084->29077 29088 57ab0dc 29087->29088 29090 57ab101 29088->29090 29095 57aa870 29088->29095 29090->29082 29092 57ab0c8 29091->29092 29093 57aa870 LoadLibraryExW 29092->29093 29094 57ab101 29092->29094 29093->29094 29094->29082 29096 57ab2a8 LoadLibraryExW 29095->29096 29098 57ab321 29096->29098 29098->29090 29099 57ad0b8 29100 57ad0fe 29099->29100 29104 57ad298 29100->29104 29107 57ad289 29100->29107 29101 57ad1eb 29111 57ac9a0 29104->29111 29108 57ad298 29107->29108 29109 57ac9a0 DuplicateHandle 29108->29109 29110 57ad2c6 29109->29110 29110->29101 29112 57ad300 DuplicateHandle 29111->29112 29113 57ad2c6 29112->29113 29113->29101 29167 57a4668 29168 57a4684 29167->29168 29169 57a4696 29168->29169 29171 57a47a0 29168->29171 29172 57a47c5 29171->29172 29176 57a48b0 29172->29176 29180 57a48a1 29172->29180 29178 57a48d7 29176->29178 29177 57a49b4 29177->29177 29178->29177 29184 57a4248 29178->29184 29182 57a48b0 29180->29182 29181 57a49b4 29181->29181 29182->29181 29183 57a4248 CreateActCtxA 29182->29183 29183->29181 29185 57a5940 CreateActCtxA 29184->29185 29187 57a5a03 29185->29187 29114 537d01c 29115 537d034 29114->29115 29116 537d08e 29115->29116 29119 98f2c08 29115->29119 29128 98f0ad4 29115->29128 29121 98f2c18 29119->29121 29120 98f2c79 29153 98f0bfc 29120->29153 29121->29120 29123 98f2c69 29121->29123 29137 98f2e6c 29123->29137 29143 98f2da0 29123->29143 29148 98f2d90 29123->29148 29124 98f2c77 29129 98f0adf 29128->29129 29130 98f2c79 29129->29130 29132 98f2c69 29129->29132 29131 98f0bfc CallWindowProcW 29130->29131 29133 98f2c77 29131->29133 29134 98f2e6c CallWindowProcW 29132->29134 29135 98f2d90 CallWindowProcW 29132->29135 29136 98f2da0 CallWindowProcW 29132->29136 29134->29133 29135->29133 29136->29133 29138 98f2e2a 29137->29138 29139 98f2e7a 29137->29139 29157 98f2e48 29138->29157 29161 98f2e58 29138->29161 29140 98f2e40 29140->29124 29144 98f2db4 29143->29144 29146 98f2e48 CallWindowProcW 29144->29146 29147 98f2e58 CallWindowProcW 29144->29147 29145 98f2e40 29145->29124 29146->29145 29147->29145 29149 98f2da0 29148->29149 29151 98f2e48 CallWindowProcW 29149->29151 29152 98f2e58 CallWindowProcW 29149->29152 29150 98f2e40 29150->29124 29151->29150 29152->29150 29154 98f0c07 29153->29154 29155 98f435a CallWindowProcW 29154->29155 29156 98f4309 29154->29156 29155->29156 29156->29124 29158 98f2e58 29157->29158 29159 98f2e69 29158->29159 29164 98f42a0 29158->29164 29159->29140 29162 98f2e69 29161->29162 29163 98f42a0 CallWindowProcW 29161->29163 29162->29140 29163->29162 29165 98f0bfc CallWindowProcW 29164->29165 29166 98f42aa 29165->29166 29166->29159
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 19b2c19884f087f8e3f7020b3c9d4785079547d07a907352203af7122da56f6d
                                • Instruction ID: 9d9704cb2e61d224de3f1cc6f91994b19478308e23bb42e426f8cf36ee856a93
                                • Opcode Fuzzy Hash: 19b2c19884f087f8e3f7020b3c9d4785079547d07a907352203af7122da56f6d
                                • Instruction Fuzzy Hash: D9220071900228CFDB69DF64C958BE9BBB2FF4A300F0095E9D509AB261DB359E84CF41
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 61be74e7376646dd2b12657366b8f1dbcb8e640868853baab5cd6a39ce3931b4
                                • Instruction ID: 9f29f34965cc73188e02e7c2e7ffff1fe9070201b80801143f5f5515f1d0c7e5
                                • Opcode Fuzzy Hash: 61be74e7376646dd2b12657366b8f1dbcb8e640868853baab5cd6a39ce3931b4
                                • Instruction Fuzzy Hash: 3CD1B734A00358CFCB18EFB4D858A9DBBB2FF8A301F5085ADE41AA7254DB355986CF51
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 6ae9c47d8fd2d03b9442ed311856e5087f7b6aeb88f53a546225a903326360ac
                                • Instruction ID: 2e057cc4670d387108841d014bf98e284831516d8d72a8ad5db4a205bfbab600
                                • Opcode Fuzzy Hash: 6ae9c47d8fd2d03b9442ed311856e5087f7b6aeb88f53a546225a903326360ac
                                • Instruction Fuzzy Hash: 7ED1B634A00358CFCB18EFB4D858A9DBBB2FF8A301F50856DE41AA7254DB359986CF51

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 656 57aae30-57aae3f 657 57aae6b-57aae6f 656->657 658 57aae41-57aae4e call 57a9838 656->658 660 57aae83-57aaec4 657->660 661 57aae71-57aae7b 657->661 663 57aae50 658->663 664 57aae64 658->664 667 57aaed1-57aaedf 660->667 668 57aaec6-57aaece 660->668 661->660 716 57aae56 call 57ab0c8 663->716 717 57aae56 call 57ab0b8 663->717 664->657 669 57aaf03-57aaf05 667->669 670 57aaee1-57aaee6 667->670 668->667 675 57aaf08-57aaf0f 669->675 672 57aaee8-57aaeef call 57aa814 670->672 673 57aaef1 670->673 671 57aae5c-57aae5e 671->664 674 57aafa0-57aafb7 671->674 677 57aaef3-57aaf01 672->677 673->677 687 57aafb9-57ab018 674->687 678 57aaf1c-57aaf23 675->678 679 57aaf11-57aaf19 675->679 677->675 681 57aaf30-57aaf39 call 57aa824 678->681 682 57aaf25-57aaf2d 678->682 679->678 688 57aaf3b-57aaf43 681->688 689 57aaf46-57aaf4b 681->689 682->681 707 57ab01a-57ab01c 687->707 688->689 690 57aaf69-57aaf76 689->690 691 57aaf4d-57aaf54 689->691 698 57aaf78-57aaf96 690->698 699 57aaf99-57aaf9f 690->699 691->690 692 57aaf56-57aaf66 call 57aa834 call 57aa844 691->692 692->690 698->699 708 57ab048-57ab060 707->708 709 57ab01e-57ab046 707->709 711 57ab068-57ab093 GetModuleHandleW 708->711 712 57ab062-57ab065 708->712 709->708 713 57ab09c-57ab0b0 711->713 714 57ab095-57ab09b 711->714 712->711 714->713 716->671 717->671
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 057AB086
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: 1c5939ae9f80740f57075f9409111fb61588050ccba444220503f7d6b5a60cd1
                                • Instruction ID: 32c56c696f10131acd597ad2dd13fc6768cd22ffb283e1a5d3daadc471b07e99
                                • Opcode Fuzzy Hash: 1c5939ae9f80740f57075f9409111fb61588050ccba444220503f7d6b5a60cd1
                                • Instruction Fuzzy Hash: B28147B1A04B458FD728DF29D04576ABBF1FF88304F008A2DD49ADBA50D775E84ACB91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 718 57a5935-57a593c 719 57a5944-57a5a01 CreateActCtxA 718->719 721 57a5a0a-57a5a64 719->721 722 57a5a03-57a5a09 719->722 729 57a5a73-57a5a77 721->729 730 57a5a66-57a5a69 721->730 722->721 731 57a5a88 729->731 732 57a5a79-57a5a85 729->732 730->729 734 57a5a89 731->734 732->731 734->734
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 057A59F1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 0886b1155f66370fef1c7a6566ec97cf072fbce1907103a5fbda67f7e18446d1
                                • Instruction ID: a3e549da05462979147ef3094ef907c180793a2ea55f951370359f1cbaf659d2
                                • Opcode Fuzzy Hash: 0886b1155f66370fef1c7a6566ec97cf072fbce1907103a5fbda67f7e18446d1
                                • Instruction Fuzzy Hash: D24102B1D04719CEDB24CFA9C884B8DBBF5BF84304F24816AD008AB255DB75594ACF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 735 98f0bfc-98f42fc 738 98f43ac-98f43cc call 98f0ad4 735->738 739 98f4302-98f4307 735->739 746 98f43cf-98f43dc 738->746 741 98f435a-98f4392 CallWindowProcW 739->741 742 98f4309-98f4340 739->742 744 98f439b-98f43aa 741->744 745 98f4394-98f439a 741->745 748 98f4349-98f4358 742->748 749 98f4342-98f4348 742->749 744->746 745->744 748->746 749->748
                                APIs
                                • CallWindowProcW.USER32(?,?,?,?,?), ref: 098F4381
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID: CallProcWindow
                                • String ID:
                                • API String ID: 2714655100-0
                                • Opcode ID: 293412fa841a3efa130e70c6ed4b03ac2a322d650d184a326f57b68127d67d22
                                • Instruction ID: 9a723d303c6c7a14fa038c537a24cb20d2bd24be3e2b5194f2da54acb2658757
                                • Opcode Fuzzy Hash: 293412fa841a3efa130e70c6ed4b03ac2a322d650d184a326f57b68127d67d22
                                • Instruction Fuzzy Hash: C94113B49003099FDB14CF99C488AAAFBF5FB88314F24C45DE619AB321D730A845CBA0

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 752 57a4248-57a5a01 CreateActCtxA 755 57a5a0a-57a5a64 752->755 756 57a5a03-57a5a09 752->756 763 57a5a73-57a5a77 755->763 764 57a5a66-57a5a69 755->764 756->755 765 57a5a88 763->765 766 57a5a79-57a5a85 763->766 764->763 768 57a5a89 765->768 766->765 768->768
                                APIs
                                • CreateActCtxA.KERNEL32(?), ref: 057A59F1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: Create
                                • String ID:
                                • API String ID: 2289755597-0
                                • Opcode ID: 4c562f9c3587713668f7888774b62debb4551dbd074631b55183a42bad8b3090
                                • Instruction ID: 5ac0a242bfa5705500f0d329f2440667537137c868dfbfd38d5b8e05e2ad5117
                                • Opcode Fuzzy Hash: 4c562f9c3587713668f7888774b62debb4551dbd074631b55183a42bad8b3090
                                • Instruction Fuzzy Hash: 2041E0B1D00719CADB24CFA9C888B8DBBF5FF88304F20816AD408AB255DB756945CF91

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 769 57ac9a0-57ad394 DuplicateHandle 771 57ad39d-57ad3ba 769->771 772 57ad396-57ad39c 769->772 772->771
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,057AD2C6,?,?,?,?,?), ref: 057AD387
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: 7e0e982247048df79b98f59990e1fe006b679db8dac6af34699c4a51a34b6062
                                • Instruction ID: 9f09b8be57472c2fccaf4227d889c866d76bb7dc2b41a154cca359392316b112
                                • Opcode Fuzzy Hash: 7e0e982247048df79b98f59990e1fe006b679db8dac6af34699c4a51a34b6062
                                • Instruction Fuzzy Hash: 6D21E3B5900308EFDB10CF9AD984ADEBBF9EB48320F14841AE959A7310D374A954DFA5

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 775 57ad2f9-57ad2fe 776 57ad300-57ad394 DuplicateHandle 775->776 777 57ad39d-57ad3ba 776->777 778 57ad396-57ad39c 776->778 778->777
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,057AD2C6,?,?,?,?,?), ref: 057AD387
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID:
                                • API String ID: 3793708945-0
                                • Opcode ID: f66c7030e9a18ce6da33152acb02ee67fdbe538705e82c5a63f8a14694c8d45c
                                • Instruction ID: acedc65f7f9b8201720a9b424ea7bde64ef6ee3bca978f45f5b04bb48edafe5a
                                • Opcode Fuzzy Hash: f66c7030e9a18ce6da33152acb02ee67fdbe538705e82c5a63f8a14694c8d45c
                                • Instruction Fuzzy Hash: BD21D2B5901218EFDB10CFAAD584ADEBBF5EB48314F14842AE958A7310D375A940CFA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 781 57aa870-57ab2e8 783 57ab2ea-57ab2ed 781->783 784 57ab2f0-57ab31f LoadLibraryExW 781->784 783->784 785 57ab328-57ab345 784->785 786 57ab321-57ab327 784->786 786->785
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,057AB101,00000800,00000000,00000000), ref: 057AB312
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: 9fdb1202b5a04219d2ea9f539964710b32009733b83cded0dcab56f1bc40eae4
                                • Instruction ID: b44bddb2b252ec3fa32b37e1aa4baa84d8560987976cfda6d5e76deb99f0043b
                                • Opcode Fuzzy Hash: 9fdb1202b5a04219d2ea9f539964710b32009733b83cded0dcab56f1bc40eae4
                                • Instruction Fuzzy Hash: 281114B69003499FDB10CF9AC444ADEFBF4EB98310F10852EE559A7210C375A545CFA4

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 789 57ab2a0-57ab2e8 790 57ab2ea-57ab2ed 789->790 791 57ab2f0-57ab31f LoadLibraryExW 789->791 790->791 792 57ab328-57ab345 791->792 793 57ab321-57ab327 791->793 793->792
                                APIs
                                • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,057AB101,00000800,00000000,00000000), ref: 057AB312
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: LibraryLoad
                                • String ID:
                                • API String ID: 1029625771-0
                                • Opcode ID: d85869425ba54cf9c4605ee15509422c63c60687b480996c8949fd9999038fda
                                • Instruction ID: bba50c284ed3c9c5eab344eaa3aea600a3f89429735a53aada4b93f39217b599
                                • Opcode Fuzzy Hash: d85869425ba54cf9c4605ee15509422c63c60687b480996c8949fd9999038fda
                                • Instruction Fuzzy Hash: 6A1112B69003499FDB10CFAAD444ADEFFF4EB88310F14842AD869A7210C375A545CFA1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 796 57ab020-57ab060 798 57ab068-57ab093 GetModuleHandleW 796->798 799 57ab062-57ab065 796->799 800 57ab09c-57ab0b0 798->800 801 57ab095-57ab09b 798->801 799->798 801->800
                                APIs
                                • GetModuleHandleW.KERNELBASE(00000000), ref: 057AB086
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID: HandleModule
                                • String ID:
                                • API String ID: 4139908857-0
                                • Opcode ID: d88012337c07bbbf7f18943c3a5f1a17b462135e0b6981e4a0fdbec8b47b33f5
                                • Instruction ID: 29632b95107c33c85097a7dcca547dd682f71fa0219b92de18a6813612b119b8
                                • Opcode Fuzzy Hash: d88012337c07bbbf7f18943c3a5f1a17b462135e0b6981e4a0fdbec8b47b33f5
                                • Instruction Fuzzy Hash: C411DFB6D003498FDB20DF9AC444ADEFBF4EB88224F10852AD469A7210C375A545CFA5
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158350438.000000000536D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0536D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_536d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 13fee7e1af27ce4b409bab7e49e0752ede13307910ab88f638f407a119f74f4b
                                • Instruction ID: b059fcdc95e57dd08ad08133538a09dd0fdfc6a38e198eb1b965cde175e73d77
                                • Opcode Fuzzy Hash: 13fee7e1af27ce4b409bab7e49e0752ede13307910ab88f638f407a119f74f4b
                                • Instruction Fuzzy Hash: 79214871204244DFCB02DF04D9C0F26BF66FB98314F20C96DD80A4F25AC776E866C6A1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158350438.000000000536D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0536D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_536d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b4325fe2c44d0d61e6eb40744b023460b392c713d67b76d70e8d3e58beab4329
                                • Instruction ID: 3ad549be6467a37e39f0472b1b5f776add00c5eb6c27bd63b4b4f4c30aaedafd
                                • Opcode Fuzzy Hash: b4325fe2c44d0d61e6eb40744b023460b392c713d67b76d70e8d3e58beab4329
                                • Instruction Fuzzy Hash: FA212571604240DFCB05DF14D9C0F26BF66FB88318F24C96DEA094FA5AC376D456CAA1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158457359.000000000537D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0537D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_537d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 30159c368f8ec7a2c40624a3966f199aee9969a2343a5880311a2211c7c5c03e
                                • Instruction ID: aac439287327633e606db6bfbeb7c1bc5ff34dea9990df5f36c14be814b5de46
                                • Opcode Fuzzy Hash: 30159c368f8ec7a2c40624a3966f199aee9969a2343a5880311a2211c7c5c03e
                                • Instruction Fuzzy Hash: D421F275A04208DFCB24DF14D9C4B26BFA6FF88314F64C96DD80A4B256C37AD447CA61
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158457359.000000000537D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0537D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_537d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0ce15913fd23f022e0a0c9b833867818f23e800896805d7753f0690b2ac455bc
                                • Instruction ID: 997716d2eda448dedfe4be3ff36e633eafcb9649043da5be6e1cd129edb9cdf2
                                • Opcode Fuzzy Hash: 0ce15913fd23f022e0a0c9b833867818f23e800896805d7753f0690b2ac455bc
                                • Instruction Fuzzy Hash: D5219F755083849FCB12CF14D994B11BFB1FF46314F28C5AAD8498F2A6C37A981ACB62
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158350438.000000000536D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0536D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_536d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                • Instruction ID: 404e5828daab406ad2f71dc544b9c00471ab47ae6fd9423f95f6f309ae1eeaf7
                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                • Instruction Fuzzy Hash: 7811D376504280CFCB16CF14D5C4B26BF72FB84318F24C6AED9490B65AC376D45ACBA1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2158350438.000000000536D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0536D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_536d000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                • Instruction ID: 62dddd016ffb29c21a718937d710693738790309ea353a60e6267957626422b1
                                • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                                • Instruction Fuzzy Hash: 5411CD72504240CFCB02CF00D5C4B26BF72FB94224F24C6A9D8090E25AC37AE86ACBA1
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b3c5a98766bddfdcd3583d3f9cab80f944257414e50872559d06ba50de507d06
                                • Instruction ID: ed3494936c5901ce9fa61c90be9f6ced63b7bf43f6a3dbd58668320be7468844
                                • Opcode Fuzzy Hash: b3c5a98766bddfdcd3583d3f9cab80f944257414e50872559d06ba50de507d06
                                • Instruction Fuzzy Hash: 1E12A4B84617868BE310CF65EC4C28D7BB1BF81718B904229F2616F7E5DBB8154ACF46
                                Memory Dump Source
                                • Source File: 00000002.00000002.2160268233.00000000057A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 057A0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_57a0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8f253fdbba315ae979d6403402c5a3a260f3366cb71788bfcec1eb16155074f7
                                • Instruction ID: acaabdbabb9129940304c476aea25fd552bf30e8f5611a8028bdacab140dd45f
                                • Opcode Fuzzy Hash: 8f253fdbba315ae979d6403402c5a3a260f3366cb71788bfcec1eb16155074f7
                                • Instruction Fuzzy Hash: EDA16E36E002158FCF15DFB4C8489EEB7B2FFC8300B15466AE906AB265DB75E945DB80
                                Memory Dump Source
                                • Source File: 00000002.00000002.2169285191.00000000098F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 098F0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_98f0000_csc.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 499ee43c343747f7b190fe51e09acc1366046c4c1701dd9c1397dd561f4d5789
                                • Instruction ID: 4eac7def147aac84bbfe9df1e17768859c10f10966e849dd227d177fefde66a5
                                • Opcode Fuzzy Hash: 499ee43c343747f7b190fe51e09acc1366046c4c1701dd9c1397dd561f4d5789
                                • Instruction Fuzzy Hash: BFC118B88217868BD710CF64EC4828D7BB1FF85328F544229E1616B3E1DBB8158ACF46