Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
x4UbCbpqkP.exe

Overview

General Information

Sample name:x4UbCbpqkP.exe
renamed because original name is a hash value
Original sample name:187049e720e9545fc7c567f85ee870ec.exe
Analysis ID:1465934
MD5:187049e720e9545fc7c567f85ee870ec
SHA1:1fd8edb9da446de7c24d633b10ca6a4c03c9499f
SHA256:6ad54ede2fb8a622eb23f83ccce4138aee91178b62183999cca5a0f4fb3b0d93
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected RedLine Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Machine Learning detection for sample
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Crypto Currency Wallets
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

  • System is w10x64
  • x4UbCbpqkP.exe (PID: 6860 cmdline: "C:\Users\user\Desktop\x4UbCbpqkP.exe" MD5: 187049E720E9545FC7C567F85EE870EC)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"C2 url": ["144.172.122.232:20131"], "Authorization Header": "70183f61f1e913a8ca5013414de9717c"}
SourceRuleDescriptionAuthorStrings
x4UbCbpqkP.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_RedLine_1Yara detected RedLine StealerJoe Security
      dump.pcapJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        00000000.00000000.1623610747.00000000009F2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: x4UbCbpqkP.exe PID: 6860JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Process Memory Space: x4UbCbpqkP.exe PID: 6860JoeSecurity_RedLineYara detected RedLine StealerJoe Security
                SourceRuleDescriptionAuthorStrings
                0.0.x4UbCbpqkP.exe.9f0000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  No Sigma rule has matched
                  Timestamp:07/02/24-09:21:53.677511
                  SID:2043234
                  Source Port:20131
                  Destination Port:49730
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/02/24-09:21:53.492903
                  SID:2046045
                  Source Port:49730
                  Destination Port:20131
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/02/24-09:21:59.015305
                  SID:2046056
                  Source Port:20131
                  Destination Port:49730
                  Protocol:TCP
                  Classtype:A Network Trojan was detected
                  Timestamp:07/02/24-09:22:04.858085
                  SID:2043231
                  Source Port:49730
                  Destination Port:20131
                  Protocol:TCP
                  Classtype:A Network Trojan was detected

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: x4UbCbpqkP.exeAvira: detected
                  Source: x4UbCbpqkP.exeMalware Configuration Extractor: RedLine {"C2 url": ["144.172.122.232:20131"], "Authorization Header": "70183f61f1e913a8ca5013414de9717c"}
                  Source: x4UbCbpqkP.exeReversingLabs: Detection: 79%
                  Source: x4UbCbpqkP.exeVirustotal: Detection: 68%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: x4UbCbpqkP.exeJoe Sandbox ML: detected
                  Source: x4UbCbpqkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: x4UbCbpqkP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 06DD5C68h0_2_06DD5770
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 06DD3863h0_2_06DD35A0
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 06DD116Fh0_2_06DD0A10
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 0724891Ah0_2_072484F8
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 07248D9Ah0_2_072484F8
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 4x nop then jmp 072402F1h0_2_07240040

                  Networking

                  barindex
                  Source: TrafficSnort IDS: 2046045 ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization) 192.168.2.4:49730 -> 144.172.122.232:20131
                  Source: TrafficSnort IDS: 2043231 ET TROJAN Redline Stealer TCP CnC Activity 192.168.2.4:49730 -> 144.172.122.232:20131
                  Source: TrafficSnort IDS: 2043234 ET MALWARE Redline Stealer TCP CnC - Id1Response 144.172.122.232:20131 -> 192.168.2.4:49730
                  Source: TrafficSnort IDS: 2046056 ET TROJAN Redline Stealer/MetaStealer Family Activity (Response) 144.172.122.232:20131 -> 192.168.2.4:49730
                  Source: Malware configuration extractorURLs: 144.172.122.232:20131
                  Source: global trafficTCP traffic: 192.168.2.4:49730 -> 144.172.122.232:20131
                  Source: Joe Sandbox ViewASN Name: M247GB M247GB
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: unknownTCP traffic detected without corresponding DNS query: 144.172.122.232
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-x509-token-profile-1.0#X509SubjectKeyIdentif
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV1.1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://docs.oasis-open.org/wss/oasis-wss-wssecurity-secext-1.1.xsd
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2002/12/policy
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/sc
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/sc/sct
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/06/addressingex
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/fault
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Commit
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Committed
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepared
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/RegisterResponse
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/10/wscoor/fault
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rmX
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/sc/sct
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Cancel
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Renew
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/SymmetricKey
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/D
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id10ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id11ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id12ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id13ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id14ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id15ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id16ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id17ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id18ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id19ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id1ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id20ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id21ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED0000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id22ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id23ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id24Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id2ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id3Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id4ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id5ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id6ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id7ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id8ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9Response
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://tempuri.org/Entity/Id9ResponseD
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.ecosia.org/autocomplete?q=
                  Source: x4UbCbpqkP.exeString found in binary or memory: https://api.ip.sb/ip
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/ac/?q=
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtab
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/chrome_newtabS
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ecosia.org/newtab/
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/images/branding/product/ico/googleg_lodp.ico
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_051BDC740_2_051BDC74
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD57700_2_06DD5770
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD75800_2_06DD7580
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD82C80_2_06DD82C8
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD00400_2_06DD0040
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DDCE680_2_06DDCE68
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD0A100_2_06DD0A10
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD3BE00_2_06DD3BE0
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD27780_2_06DD2778
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD27680_2_06DD2768
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD14700_2_06DD1470
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD14620_2_06DD1462
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD1E680_2_06DD1E68
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD1E2F0_2_06DD1E2F
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_072484F80_2_072484F8
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_0724AF480_2_0724AF48
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_072484F50_2_072484F5
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_072400060_2_07240006
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_072400400_2_07240040
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_07246A280_2_07246A28
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_07246A190_2_07246A19
                  Source: x4UbCbpqkP.exe, 00000000.00000000.1623635495.0000000000A31000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBanted.exe8 vs x4UbCbpqkP.exe
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1756450889.0000000000F5E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs x4UbCbpqkP.exe
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename vs x4UbCbpqkP.exe
                  Source: x4UbCbpqkP.exeBinary or memory string: OriginalFilenameBanted.exe8 vs x4UbCbpqkP.exe
                  Source: x4UbCbpqkP.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/1@0/1
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile created: C:\Users\user\AppData\Local\SystemCacheJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeMutant created: NULL
                  Source: x4UbCbpqkP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: x4UbCbpqkP.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process Where SessionId='1'
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Process
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: x4UbCbpqkP.exeReversingLabs: Detection: 79%
                  Source: x4UbCbpqkP.exeVirustotal: Detection: 68%
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: msvcp140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: rstrtmgr.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D68AF00A-29CB-43FA-8504-CE99A996D9EA}\InprocServer32Jump to behavior
                  Source: x4UbCbpqkP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: x4UbCbpqkP.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: x4UbCbpqkP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: x4UbCbpqkP.exeStatic PE information: 0xF14EB231 [Wed Apr 16 06:01:21 2098 UTC]
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD2310 push es; ret 0_2_06DD2320
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD5F13 push edx; iretd 0_2_06DD5F1F
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_DiskDrive
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeMemory allocated: 2D70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWindow / User API: threadDelayed 908Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWindow / User API: threadDelayed 3070Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exe TID: 7180Thread sleep time: -9223372036854770s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exe TID: 6212Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1756607563.000000000102B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll(
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeCode function: 0_2_06DD3BE0 LdrInitializeThunk,0_2_06DD3BE0
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Users\user\Desktop\x4UbCbpqkP.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.IdentityModel\v4.0_4.0.0.0__b77a5c561934e089\System.IdentityModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\SMDiagnostics\v4.0_4.0.0.0__b77a5c561934e089\SMDiagnostics.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel.Internals\v4.0_4.0.0.0__31bf3856ad364e35\System.ServiceModel.Internals.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Web\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Web.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                  Source: x4UbCbpqkP.exe, 00000000.00000002.1762209976.0000000006A30000.00000004.00000020.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1756607563.000000000102B000.00000004.00000020.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1763176040.0000000006E07000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter : SELECT * FROM FirewallProduct
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntivirusProduct
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM AntiSpyWareProduct
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeWMI Queries: IWbemServices::ExecQuery - ROOT\SecurityCenter2 : SELECT * FROM FirewallProduct

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: x4UbCbpqkP.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.x4UbCbpqkP.exe.9f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1623610747.00000000009F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x4UbCbpqkP.exe PID: 6860, type: MEMORYSTR
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqliteJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Extension CookiesJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\atomic\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Binance\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\Cache\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\db\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Local\Coinomi\Coinomi\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Electrum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Ethereum\wallets\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\exodus.wallet\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Exodus\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\Guarda\Jump to behavior
                  Source: C:\Users\user\Desktop\x4UbCbpqkP.exeFile opened: C:\Users\user\AppData\Roaming\com.liberty.jaxx\Jump to behavior
                  Source: Yara matchFile source: 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x4UbCbpqkP.exe PID: 6860, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: dump.pcap, type: PCAP
                  Source: Yara matchFile source: x4UbCbpqkP.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.x4UbCbpqkP.exe.9f0000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1623610747.00000000009F2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x4UbCbpqkP.exe PID: 6860, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts221
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  231
                  Security Software Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                  Disable or Modify Tools
                  LSASS Memory1
                  Process Discovery
                  Remote Desktop Protocol2
                  Data from Local System
                  1
                  Non-Standard Port
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)241
                  Virtualization/Sandbox Evasion
                  Security Account Manager241
                  Virtualization/Sandbox Evasion
                  SMB/Windows Admin SharesData from Network Shared Drive1
                  Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                  Obfuscated Files or Information
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Timestomp
                  LSA Secrets113
                  System Information Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  x4UbCbpqkP.exe79%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                  x4UbCbpqkP.exe69%VirustotalBrowse
                  x4UbCbpqkP.exe100%AviraHEUR/AGEN.1307407
                  x4UbCbpqkP.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  bg.microsoft.map.fastly.net0%VirustotalBrowse
                  SourceDetectionScannerLabelLink
                  http://tempuri.org/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                  https://api.ip.sb/ip0%URL Reputationsafe
                  https://www.ecosia.org/newtab/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns0%URL Reputationsafe
                  http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
                  http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%Avira URL Cloudsafe
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%Avira URL Cloudsafe
                  https://duckduckgo.com/ac/?q=0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id14ResponseD0%Avira URL Cloudsafe
                  https://duckduckgo.com/chrome_newtab0%VirustotalBrowse
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text0%VirustotalBrowse
                  http://tempuri.org/Entity/Id23ResponseD0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk0%VirustotalBrowse
                  https://duckduckgo.com/ac/?q=0%VirustotalBrowse
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id2Response0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id12Response0%Avira URL Cloudsafe
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id14ResponseD2%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/sc/sct0%VirustotalBrowse
                  http://tempuri.org/Entity/Id21Response4%VirustotalBrowse
                  http://tempuri.org/Entity/Id2Response2%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha10%VirustotalBrowse
                  http://tempuri.org/Entity/Id93%VirustotalBrowse
                  http://tempuri.org/Entity/Id12Response2%VirustotalBrowse
                  http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%VirustotalBrowse
                  http://tempuri.org/Entity/Id23ResponseD1%VirustotalBrowse
                  http://tempuri.org/Entity/Id21Response0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id90%Avira URL Cloudsafe
                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id80%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id6ResponseD0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id50%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id40%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id70%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id60%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id51%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare0%VirustotalBrowse
                  http://tempuri.org/Entity/Id81%VirustotalBrowse
                  http://tempuri.org/Entity/Id6ResponseD1%VirustotalBrowse
                  http://tempuri.org/Entity/Id19Response0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id71%VirustotalBrowse
                  http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id41%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id13ResponseD0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue0%VirustotalBrowse
                  http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license0%VirustotalBrowse
                  http://tempuri.org/Entity/Id19Response2%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted0%VirustotalBrowse
                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/10/wsat0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id13ResponseD1%VirustotalBrowse
                  http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id15Response0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id5ResponseD0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/fault0%VirustotalBrowse
                  http://tempuri.org/Entity/Id61%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id6Response0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wsat0%VirustotalBrowse
                  http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id15Response2%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/04/sc0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew0%VirustotalBrowse
                  http://tempuri.org/Entity/Id5ResponseD2%VirustotalBrowse
                  http://tempuri.org/Entity/Id1ResponseD0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id6Response2%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey0%VirustotalBrowse
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id9Response0%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id1ResponseD1%VirustotalBrowse
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=0%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register0%VirustotalBrowse
                  http://tempuri.org/Entity/Id200%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/04/sc0%VirustotalBrowse
                  http://tempuri.org/Entity/Id210%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id220%Avira URL Cloudsafe
                  http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA10%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id230%Avira URL Cloudsafe
                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA10%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id240%Avira URL Cloudsafe
                  http://tempuri.org/Entity/Id24Response0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  bg.microsoft.map.fastly.net
                  199.232.210.172
                  truefalseunknown
                  NameMaliciousAntivirus DetectionReputation
                  144.172.122.232:20131true
                  • Avira URL Cloud: safe
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Textx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/sc/sctx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/chrome_newtabx4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/security/sc/dkx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/ac/?q=x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id14ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id23ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinaryx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id12Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Entity/Id2Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id21Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 4%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrapx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id9x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 3%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLIDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id8x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id6ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002ED6000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id5x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Preparex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id4x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id7x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id6x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecretx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id19Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#licensex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issuex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Abortedx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequencex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Entity/Id13ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/faultx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsatx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeyx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id15Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id5ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renewx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/Registerx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id6Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 2%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKeyx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ip.sb/ipx4UbCbpqkP.exefalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/scx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id1ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 1%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PCx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancelx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id9Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id20x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id21x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id22x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id23x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id24x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issuex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id24Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  https://www.ecosia.org/newtab/x4UbCbpqkP.exe, 00000000.00000002.1757033587.00000000033C1000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000333A000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000341F000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000003389000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Entity/Id1Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequestedx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnlyx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Replayx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnegox4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binaryx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PCx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKeyx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id21ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/08/addressingx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issuex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wsat/Completionx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/trustx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id10x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id11x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id10ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id12x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id16Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancelx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id13x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id14x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id15x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id16x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Noncex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id17x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id18x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id5Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id19x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://tempuri.org/Entity/Id15ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id10Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/02/trust/Renewx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id11ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.000000000307B000.00000004.00000800.00020000.00000000.sdmp, x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id8Responsex4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKeyx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionIDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCTx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/ws/2006/02/addressingidentityx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://tempuri.org/Entity/Id17ResponseDx4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002E57000.00000004.00000800.00020000.00000000.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://schemas.xmlsoap.org/soap/envelope/x4UbCbpqkP.exe, 00000000.00000002.1757033587.0000000002D71000.00000004.00000800.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  144.172.122.232
                  unknownUnited States
                  9009M247GBtrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1465934
                  Start date and time:2024-07-02 09:21:05 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 2m 34s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:2
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:x4UbCbpqkP.exe
                  renamed because original name is a hash value
                  Original Sample Name:187049e720e9545fc7c567f85ee870ec.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@1/1@0/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 29
                  • Number of non-executed functions: 12
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Stop behavior analysis, all processes terminated
                  • Exclude process from analysis (whitelisted): SIHClient.exe
                  • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                  TimeTypeDescription
                  03:22:01API Interceptor21x Sleep call for process: x4UbCbpqkP.exe modified
                  No context
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  bg.microsoft.map.fastly.nethttp://url2530.tvsmotor.com/ls/click?upn=u001.smInq0-2BkNc5oRshkzMLE7U6zcio2-2F9zwu1ZIXUanV0NJI-2BOrcqj0f4SCu-2B-2BWZYRJ5WulbQ5i5mBsK1zXEak-2FiMRG64aR-2FUGiDgoHteplEfqii9y-2FZm8OviJTU1sjmz7jpaYlxIO-2FZqsCEMZLobIAuBKqKOl6jqYqSAHVwBkUZuGRzhvuesvLIb-2BOJaFEug0CxFHH8i5A3U7lzl-2BTzhlR6ei7mav1762I-2BKvT-2Fk6a5kJfjpj9RJPK9q48Ck5mSzSlgwV-2BsscO5sphM5t-2BVSr5yuCYcPokWOxF7VJFLVcuGxe55FXxdx2OWqy1uhpoEHKlprCsCZc7-2FzwTpK7gWkfISgE1dm3DNZag7jRcJoAY96XjRqTOiYZpVCYj4WczYZatXIFKlGImVUX-2BtzacIIXUkQ-3D-3Dxdxc_PRiWw-2BWerOwUL-2FYAA-2FiwxOm-2BJW3ubqhGFJ5iVqhmG217gfj9KgzNOSRNluvFvYbWIHUd-2ByAsKYpybXBhPgqT-2F1WfaNjyxdi-2FNqxuKfkiep8TocNXSydFj2bAYBLtB5MEDItgpH6g-2FV3171HTXrzYHtaSp7MB2B8WILdzxuyybTMsChhP3QdW9m4oU0X1zagLaXiyfnb7qkeR5CYT3FajfA-3D-3DGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  Payment_Confirmation_Receipts.vbsGet hashmaliciousGuLoaderBrowse
                  • 199.232.210.172
                  New Sample Request.scr.exeGet hashmaliciousUnknownBrowse
                  • 199.232.214.172
                  KWOTASIE.exeGet hashmaliciousAgentTeslaBrowse
                  • 199.232.210.172
                  Payment Confirmation.vbsGet hashmaliciousRemcos, GuLoaderBrowse
                  • 199.232.210.172
                  pDHKarOK2v.exeGet hashmaliciousCryptOne, VidarBrowse
                  • 199.232.214.172
                  Revised Invoice 7389293.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 199.232.210.172
                  http://differentia.ruGet hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  https://docs.google.com/forms/d/e/1FAIpQLSdxwlJ42E7IP7P7FI5J10LvcZM2xU4rjZus8shJYViiMODIbA/viewform?pli=1Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  http://polyfill.io/Get hashmaliciousUnknownBrowse
                  • 199.232.210.172
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  M247GBMaersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.198
                  Revised Invoice 7389293.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.198
                  8hd98EhtIFcYkb8.exeGet hashmaliciousFormBookBrowse
                  • 38.207.19.49
                  DHL Shipping Document Awb & BL.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.194
                  TOP URGENT PURCHASE ORDER SHEET & SPECIFICATIONS.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.194
                  invoice-72717953897646054572255005658360083176291774189023-quiltercheviot.pdfGet hashmaliciousHTMLPhisherBrowse
                  • 38.132.122.254
                  Maersk_BL_Invoice_Packinglist.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.194
                  BviOG97ArX.elfGet hashmaliciousMirai, MoobotBrowse
                  • 173.211.86.129
                  DCwYFBy6z7.elfGet hashmaliciousMirai, MoobotBrowse
                  • 38.204.196.215
                  DHL Shipping Invoice & Awb8289djuejeeoffffdelivery.vbsGet hashmaliciousGuLoader, RemcosBrowse
                  • 206.123.148.194
                  No context
                  No context
                  Process:C:\Users\user\Desktop\x4UbCbpqkP.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):3094
                  Entropy (8bit):5.33145931749415
                  Encrypted:false
                  SSDEEP:96:Pq5qHwCYqh3oPtI6eqzxP0aymTqdqlq7qqjqcEZ5D:Pq5qHwCYqh3qtI6eqzxP0atTqdqlq7qV
                  MD5:3FD5C0634443FB2EF2796B9636159CB6
                  SHA1:366DDE94AEFCFFFAB8E03AD8B448E05D7489EB48
                  SHA-256:58307E94C67E2348F5A838DE4FF668983B38B7E9A3B1D61535D3A392814A57D6
                  SHA-512:8535E7C0777C6B0876936D84BDE2BDC59963CF0954D4E50D65808E6E806E8B131DF5DB8FA0E030FAE2702143A7C3A70698A2B9A80519C9E2FFC286A71F0B797C
                  Malicious:true
                  Reputation:high, very likely benign file
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):4.809458973082986
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                  • Win32 Executable (generic) a (10002005/4) 49.78%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:x4UbCbpqkP.exe
                  File size:292'864 bytes
                  MD5:187049e720e9545fc7c567f85ee870ec
                  SHA1:1fd8edb9da446de7c24d633b10ca6a4c03c9499f
                  SHA256:6ad54ede2fb8a622eb23f83ccce4138aee91178b62183999cca5a0f4fb3b0d93
                  SHA512:ae8f75b7bfe61bb5251fe20d5ac69c9d1140539e17df11f05f1665b57844ee68a288ba1f8e2791830785baed916fae7a0599506a530f8f7ca4f4d3f393b8d403
                  SSDEEP:3072:4qFFrqwIOGBHy9MGSwTca9G2f6ZkOEhdIVLZ0fHIOcZqf7D34yyCbBOr:LBIOGfardaLZifcZqf7DIyy
                  TLSH:4D543A2873D8C911E53E4B79D471D6B093B0ED12A817E35B5ED07CAB3D36B40EA11AB2
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...1.N...............0.................. ........@.. ....................................@................................
                  Icon Hash:0f0179d4d479038f
                  Entrypoint:0x429fc2
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows gui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0xF14EB231 [Wed Apr 16 06:01:21 2098 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  popad
                  add byte ptr [ebp+00h], dh
                  je 00007F19E9105FD2h
                  outsd
                  add byte ptr [esi+00h], ah
                  imul eax, dword ptr [eax], 006C006Ch
                  xor eax, 59007400h
                  add byte ptr [edi+00h], dl
                  push edx
                  add byte ptr [ecx+00h], dh
                  popad
                  add byte ptr [edi+00h], dl
                  push esi
                  add byte ptr [edi+00h], ch
                  popad
                  add byte ptr [ebp+00h], ch
                  push 61006800h
                  add byte ptr [ebp+00h], ch
                  dec edx
                  add byte ptr [eax], bh
                  add byte ptr [edi+00h], dl
                  push edi
                  add byte ptr [ecx], bh
                  add byte ptr [ecx+00h], bh
                  bound eax, dword ptr [eax]
                  xor al, byte ptr [eax]
                  insb
                  add byte ptr [eax+00h], bl
                  pop ecx
                  add byte ptr [edi+00h], dl
                  js 00007F19E9105FD2h
                  jnc 00007F19E9105FD2h
                  pop edx
                  add byte ptr [eax+00h], bl
                  push ecx
                  add byte ptr [ebx+00h], cl
                  popad
                  add byte ptr [edi+00h], dl
                  dec edx
                  add byte ptr [ebp+00h], dh
                  pop edx
                  add byte ptr [edi+00h], dl
                  jo 00007F19E9105FD2h
                  imul eax, dword ptr [eax], 5Ah
                  add byte ptr [ebp+00h], ch
                  jo 00007F19E9105FD2h
                  je 00007F19E9105FD2h
                  bound eax, dword ptr [eax]
                  push edi
                  add byte ptr [eax+eax+77h], dh
                  add byte ptr [ecx+00h], bl
                  xor al, byte ptr [eax]
                  xor eax, 63007300h
                  add byte ptr [edi+00h], al
                  push esi
                  add byte ptr [ecx+00h], ch
                  popad
                  add byte ptr [edx], dh
                  add byte ptr [eax+00h], bh
                  je 00007F19E9105FD2h
                  bound eax, dword ptr [eax]
                  insd
                  add byte ptr [eax+eax+76h], dh
                  add byte ptr [edx+00h], bl
                  push edi
                  add byte ptr [ecx], bh
                  add byte ptr [eax+00h], dh
                  popad
                  add byte ptr [edi+00h], al
                  cmp dword ptr [eax], eax
                  insd
                  add byte ptr [edx+00h], bl
                  push edi
                  add byte ptr [esi+00h], cl
                  cmp byte ptr [eax], al
                  push esi
                  add byte ptr [eax+00h], cl
                  dec edx
                  add byte ptr [esi+00h], dh
                  bound eax, dword ptr [eax]
                  insd
                  add byte ptr [eax+00h], bh
                  jo 00007F19E9105FD2h
                  bound eax, dword ptr [eax]
                  insd
                  add byte ptr [ebx+00h], dh
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x29f700x4f.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x300000x19da8.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x29f540x1c.text
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x2cfa80x2d000939bd28a073181db002fb83b4eaecc39False0.4616644965277778data6.16789035104987IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x300000x19da80x1a000a4f424516bbe0de150f62a2b16406561False0.12208909254807693data1.5501848344062148IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x4a0000xc0x4006a1e0749cab609b2f210f18b32dd4739False0.025390625data0.05585530805374581IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_ICON0x302500x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.19676360225140713
                  RT_ICON0x312f80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2835 x 2835 px/m0.09013072282030049
                  RT_ICON0x41b200x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 2835 x 2835 px/m0.13905290505432216
                  RT_ICON0x45d480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 2835 x 2835 px/m0.17033195020746889
                  RT_ICON0x482f00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 2835 x 2835 px/m0.2045028142589118
                  RT_ICON0x493980x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 2835 x 2835 px/m0.24645390070921985
                  RT_GROUP_ICON0x498000x14data1.1
                  RT_GROUP_ICON0x498140x5adata0.7666666666666667
                  RT_VERSION0x498700x34adata0.44418052256532065
                  RT_MANIFEST0x49bbc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  DLLImport
                  mscoree.dll_CorExeMain
                  TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                  07/02/24-09:21:53.677511TCP2043234ET MALWARE Redline Stealer TCP CnC - Id1Response2013149730144.172.122.232192.168.2.4
                  07/02/24-09:21:53.492903TCP2046045ET TROJAN [ANY.RUN] RedLine Stealer/MetaStealer Family Related (MC-NMF Authorization)4973020131192.168.2.4144.172.122.232
                  07/02/24-09:21:59.015305TCP2046056ET TROJAN Redline Stealer/MetaStealer Family Activity (Response)2013149730144.172.122.232192.168.2.4
                  07/02/24-09:22:04.858085TCP2043231ET TROJAN Redline Stealer TCP CnC Activity4973020131192.168.2.4144.172.122.232
                  TimestampSource PortDest PortSource IPDest IP
                  Jul 2, 2024 09:21:52.735893011 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:52.740925074 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:52.741029024 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:52.749460936 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:52.754189014 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:53.360846043 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:53.416836977 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:53.492902994 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:53.500677109 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:53.677510977 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:53.725300074 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:58.838571072 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:58.843441963 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.015305042 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.015431881 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.015441895 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.015497923 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.015582085 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.015638113 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.106664896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.106695890 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.106770992 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.241552114 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.246340990 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.413841009 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.459655046 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.474854946 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.479743004 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479753017 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479790926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479799986 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479804993 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479827881 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.479875088 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479885101 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.479931116 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.480032921 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.484369993 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.484612942 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.484621048 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.484623909 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.484707117 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.717304945 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.748826027 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.753640890 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.921844006 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:21:59.930016994 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:21:59.934885025 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.101430893 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.130445004 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:00.135498047 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.301479101 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.324992895 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:00.330005884 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.505866051 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:00.553426981 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:00.954030991 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:00.959085941 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.125286102 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.133210897 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.138055086 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138065100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138079882 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138087988 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138097048 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138221025 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138278961 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.138365030 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.376138926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.428400993 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.456943989 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.461800098 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.627312899 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.636807919 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.641652107 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.807706118 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.810565948 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.815529108 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.980860949 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:01.982146978 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:01.986994028 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.152740002 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.154824972 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:02.159679890 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.325472116 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.373964071 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:02.686889887 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:02.691905022 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.691917896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.691927910 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.932244062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:02.935122013 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:02.940006971 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.182919025 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.225301981 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.556178093 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.563524961 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.563972950 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.564048052 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.564084053 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.564547062 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.564627886 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.564682961 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.564758062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.566338062 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.567033052 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.567078114 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.567086935 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.567095041 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.567158937 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.568629026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.570346117 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.570667982 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.570718050 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.570725918 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.570785046 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.571269035 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.571321011 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.571326017 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.571367025 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.573492050 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.573595047 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.573751926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.573862076 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.575882912 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.575973988 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.576013088 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.576041937 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.576097012 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.576505899 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.576564074 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.578613043 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.578659058 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.578668118 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.578728914 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.579158068 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579170942 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579180002 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579225063 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579241991 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.579281092 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579283953 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.579291105 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579322100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579329967 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.579346895 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.579422951 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.581309080 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581319094 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581365108 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581387997 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.581433058 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581459045 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581470966 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581857920 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581866026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581918001 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581926107 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.581928968 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584043980 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584090948 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584098101 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584342003 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584350109 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584357023 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584364891 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584368944 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584376097 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584384918 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584392071 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584398985 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584405899 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.584573030 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.585951090 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.585959911 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.585984945 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586013079 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586025000 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586035013 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586050034 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586066008 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586075068 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586114883 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586116076 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586163998 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586164951 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586195946 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586218119 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586256027 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586560011 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586602926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586610079 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586610079 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586617947 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586652994 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586669922 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586679935 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586808920 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586817026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586823940 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586831093 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586838961 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.586863995 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.586935043 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.588831902 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.588840008 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.588900089 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.588907957 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.588964939 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.588973045 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589025974 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589034081 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589633942 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589641094 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589703083 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589718103 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589792013 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589799881 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589833975 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589899063 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.589910984 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590023994 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590032101 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590039968 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590046883 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590054035 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.590063095 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.591443062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.591478109 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592199087 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592206955 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592262983 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592300892 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592308998 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592329025 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592369080 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592377901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592449903 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592458010 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592503071 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592509985 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592552900 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592622042 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592643023 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592650890 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592667103 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592683077 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.592766047 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593319893 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593364000 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593372107 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593456984 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593465090 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593472004 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593507051 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593513966 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593522072 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593574047 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593647003 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.593653917 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.594908953 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.594961882 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595053911 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595068932 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595149994 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595158100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595238924 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595247030 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595252991 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595262051 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595293999 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595300913 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595324993 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595333099 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595395088 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595402002 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595428944 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595436096 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595479012 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595485926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595521927 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595529079 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.595606089 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.600215912 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.600373983 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.600373983 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.600461960 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607573986 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607584000 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607633114 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607641935 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607667923 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607702017 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607703924 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607712030 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607768059 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607778072 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607791901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607822895 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607831001 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607844114 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607873917 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607877016 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607887030 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607913971 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607922077 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607929945 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.607964039 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.607974052 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608035088 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608042955 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608095884 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608133078 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608237028 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608244896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608251095 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608258963 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608310938 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608319044 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608352900 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608361006 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608413935 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608422041 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608453989 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608463049 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608525991 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608534098 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608552933 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608609915 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608653069 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608660936 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608669996 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608741045 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608748913 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608757019 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608901024 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608910084 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608951092 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.608977079 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609019041 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609026909 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609086990 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609093904 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609173059 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609179974 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609250069 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609256983 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609263897 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609307051 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609313965 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609335899 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609344006 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609399080 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609406948 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609457016 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609464884 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609529972 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609536886 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609544992 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609553099 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609565020 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609596968 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609612942 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609682083 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609689951 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609806061 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609812975 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.609817028 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.610987902 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611022949 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611136913 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611145020 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611169100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611176014 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611222982 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611238003 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611309052 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611315966 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611397028 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611403942 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611459017 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611466885 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611517906 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611526012 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611582041 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611589909 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611638069 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.611645937 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615252018 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615258932 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615309954 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615372896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615461111 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615530968 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615613937 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615622044 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615663052 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615708113 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615715981 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615722895 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.615730047 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.619317055 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.619460106 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.619460106 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.619559050 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.626941919 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.626998901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627007008 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627072096 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627079964 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627087116 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627094984 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627098083 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627105951 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627149105 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627157927 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627161026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627167940 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627216101 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627289057 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627298117 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627304077 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627311945 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627319098 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627326012 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627329111 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627361059 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627368927 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627376080 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627382994 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627389908 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627393007 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627424002 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627430916 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627438068 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627445936 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627485037 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627492905 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627500057 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627506971 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627511024 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627552032 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627559900 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627563000 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627573967 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627580881 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627602100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627609015 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627646923 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627655029 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627685070 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627693892 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627701044 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627722025 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627729893 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627763033 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627770901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627863884 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627871990 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627880096 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627942085 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627948999 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.627955914 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628026962 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628035069 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628041983 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628048897 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628053904 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628061056 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628144026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628151894 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628154993 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628163099 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628170013 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628176928 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628247023 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628254890 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628262043 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628268957 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.628287077 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.628433943 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.630017996 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630147934 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630156040 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630158901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630167007 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630175114 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630207062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630215883 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630304098 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630311966 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630319118 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630326986 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630335093 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630342007 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630352974 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630359888 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630362988 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630407095 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630414009 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630420923 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630435944 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630501032 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630512953 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630521059 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630558014 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630565882 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630615950 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630623102 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630630970 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630637884 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630646944 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630661011 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630667925 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.630964041 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.631119013 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.635435104 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635443926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635453939 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635531902 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635540009 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635549068 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635606050 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635613918 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635621071 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635631084 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635638952 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635698080 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635706902 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635714054 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635726929 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635735035 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635749102 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635785103 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635829926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635838032 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635921001 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635929108 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635955095 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.635994911 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636002064 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636010885 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636040926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636096954 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636106014 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636109114 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636123896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636131048 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636195898 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636204004 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.636214018 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.637981892 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638040066 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638046980 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638056993 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638140917 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638149023 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638156891 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638216972 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638225079 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638276100 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638284922 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638304949 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638340950 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638421059 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638428926 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638437033 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638443947 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638453007 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638495922 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638676882 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638731003 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638739109 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638818026 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638827085 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638834000 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638848066 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638936043 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.638937950 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638957977 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638964891 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638972044 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.638989925 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639080048 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639081001 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.639090061 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639098883 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639106035 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639112949 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639120102 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.639123917 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640698910 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640727997 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640769958 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640778065 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640819073 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640826941 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640865088 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640872955 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640881062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640901089 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640953064 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.640960932 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641024113 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641031981 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641038895 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641043901 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641047001 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641074896 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641138077 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641146898 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641154051 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641163111 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.641176939 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.678406000 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.684457064 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.708189964 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.713092089 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713119984 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713139057 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713146925 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713238001 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713246107 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713253021 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713283062 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713298082 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713304996 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713309050 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713315010 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713330030 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713336945 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.713341951 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:03.725290060 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:03.731589079 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.297314882 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.333885908 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:04.338924885 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.507695913 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.512526989 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:04.518793106 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.684942961 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.685380936 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:04.690207005 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.857340097 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:04.858084917 CEST4973020131192.168.2.4144.172.122.232
                  Jul 2, 2024 09:22:04.862998962 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:05.032325029 CEST2013149730144.172.122.232192.168.2.4
                  Jul 2, 2024 09:22:05.062283039 CEST4973020131192.168.2.4144.172.122.232
                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                  Jul 2, 2024 09:22:12.746440887 CEST1.1.1.1192.168.2.40xfd18No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                  Jul 2, 2024 09:22:12.746440887 CEST1.1.1.1192.168.2.40xfd18No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Target ID:0
                  Start time:03:21:50
                  Start date:02/07/2024
                  Path:C:\Users\user\Desktop\x4UbCbpqkP.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\x4UbCbpqkP.exe"
                  Imagebase:0x9f0000
                  File size:292'864 bytes
                  MD5 hash:187049E720E9545FC7C567F85EE870EC
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1623610747.00000000009F2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1757033587.0000000002E04000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:13.7%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:106
                    Total number of Limit Nodes:17
                    execution_graph 38829 51bad38 38833 51bae20 38829->38833 38843 51bae30 38829->38843 38830 51bad47 38834 51bae41 38833->38834 38837 51bae64 38833->38837 38853 51b9838 38834->38853 38837->38830 38838 51bae5c 38838->38837 38839 51bb068 GetModuleHandleW 38838->38839 38840 51bb095 38839->38840 38840->38830 38844 51bae41 38843->38844 38847 51bae64 38843->38847 38845 51b9838 GetModuleHandleW 38844->38845 38846 51bae4c 38845->38846 38846->38847 38851 51bb0b8 2 API calls 38846->38851 38852 51bb0c8 2 API calls 38846->38852 38847->38830 38848 51bae5c 38848->38847 38849 51bb068 GetModuleHandleW 38848->38849 38850 51bb095 38849->38850 38850->38830 38851->38848 38852->38848 38854 51bb020 GetModuleHandleW 38853->38854 38856 51bae4c 38854->38856 38856->38837 38857 51bb0c8 38856->38857 38862 51bb0b8 38856->38862 38858 51b9838 GetModuleHandleW 38857->38858 38859 51bb0dc 38857->38859 38858->38859 38860 51bb101 38859->38860 38867 51ba870 38859->38867 38860->38838 38863 51b9838 GetModuleHandleW 38862->38863 38864 51bb0dc 38863->38864 38865 51ba870 LoadLibraryExW 38864->38865 38866 51bb101 38864->38866 38865->38866 38866->38838 38868 51bb2a8 LoadLibraryExW 38867->38868 38870 51bb321 38868->38870 38870->38860 38871 51bd0b8 38872 51bd0fe 38871->38872 38876 51bd289 38872->38876 38879 51bd298 38872->38879 38873 51bd1eb 38877 51bd2c6 38876->38877 38882 51bc9a0 38876->38882 38877->38873 38880 51bc9a0 DuplicateHandle 38879->38880 38881 51bd2c6 38880->38881 38881->38873 38883 51bd300 DuplicateHandle 38882->38883 38884 51bd396 38883->38884 38884->38877 38936 51b4668 38937 51b4684 38936->38937 38938 51b4696 38937->38938 38940 51b47a0 38937->38940 38941 51b47c5 38940->38941 38945 51b48b0 38941->38945 38949 51b48a1 38941->38949 38946 51b48d7 38945->38946 38948 51b49b4 38946->38948 38953 51b4248 38946->38953 38950 51b48b0 38949->38950 38951 51b49b4 38950->38951 38952 51b4248 CreateActCtxA 38950->38952 38951->38951 38952->38951 38954 51b5940 CreateActCtxA 38953->38954 38956 51b5a03 38954->38956 38822 7249e28 38823 7249fb3 38822->38823 38825 7249e4e 38822->38825 38825->38823 38826 7247ec8 38825->38826 38827 724a0a8 PostMessageW 38826->38827 38828 724a114 38827->38828 38828->38825 38885 6dd9f31 38886 6dd9ecc 38885->38886 38887 6dd9f3a 38885->38887 38891 6ddafc1 38886->38891 38895 6ddafd0 38886->38895 38888 6dd9eed 38892 6ddb018 38891->38892 38893 6ddb021 38892->38893 38899 6ddab64 38892->38899 38893->38888 38896 6ddb018 38895->38896 38897 6ddb021 38896->38897 38898 6ddab64 LoadLibraryW 38896->38898 38897->38888 38898->38897 38900 6ddb118 LoadLibraryW 38899->38900 38902 6ddb18d 38900->38902 38902->38893 38903 6dd2ff0 38904 6dd3017 38903->38904 38905 6dd309c 38904->38905 38912 6dd4fdf 38904->38912 38916 6dd3be0 38904->38916 38920 6dd4680 38904->38920 38924 6dd3bd1 38904->38924 38928 6dd492b 38904->38928 38932 6dd50be 38904->38932 38915 6dd3ed4 38912->38915 38913 6dd5061 38913->38913 38914 6dd455b LdrInitializeThunk 38914->38915 38915->38913 38915->38914 38919 6dd3c0d 38916->38919 38917 6dd5061 38917->38917 38918 6dd455b LdrInitializeThunk 38918->38919 38919->38917 38919->38918 38922 6dd3ed4 38920->38922 38921 6dd5061 38921->38921 38922->38921 38923 6dd455b LdrInitializeThunk 38922->38923 38923->38922 38927 6dd3be0 38924->38927 38925 6dd5061 38925->38925 38926 6dd455b LdrInitializeThunk 38926->38927 38927->38925 38927->38926 38930 6dd3ed4 38928->38930 38929 6dd5061 38929->38929 38930->38929 38931 6dd455b LdrInitializeThunk 38930->38931 38931->38930 38935 6dd3d40 38932->38935 38933 6dd5061 38933->38933 38934 6dd455b LdrInitializeThunk 38934->38935 38935->38933 38935->38934
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: (_^q$(_^q$,bq$4c^q$4c^q$Hbq$Nv]q$$^q$$^q$c^q$c^q
                    • API String ID: 0-3459267885
                    • Opcode ID: d5c45af2fd8512511f6224ea25e730e6165b1e570b3fabe62353949aac7913ed
                    • Instruction ID: dfca0fc02456bd60a22886985b084364936fdb9515162d340f255e47398235bf
                    • Opcode Fuzzy Hash: d5c45af2fd8512511f6224ea25e730e6165b1e570b3fabe62353949aac7913ed
                    • Instruction Fuzzy Hash: 3482A670F801285FCB69EB7D845027D6AE3BFCD700B2048A9C446DB394EE35DD868B96

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 708 6dd7580-6dd75c1 710 6dd75cd-6dd75d1 708->710 711 6dd75c3-6dd75cb 708->711 712 6dd75d6-6dd75db 710->712 711->712 713 6dd75dd-6dd75e2 712->713 714 6dd75e4-6dd75ed 712->714 715 6dd75f0-6dd75f2 713->715 714->715 716 6dd795e-6dd7988 715->716 717 6dd75f8-6dd7611 call 6dd73f8 715->717 741 6dd798f-6dd79cf 716->741 721 6dd765f-6dd7666 717->721 722 6dd7613-6dd7623 717->722 726 6dd7668 721->726 727 6dd766b-6dd767b 721->727 723 6dd7629-6dd7641 722->723 724 6dd78f6-6dd7913 722->724 728 6dd791c-6dd7925 723->728 729 6dd7647-6dd764e 723->729 724->728 726->727 730 6dd767d-6dd7689 727->730 731 6dd768b-6dd76a8 727->731 732 6dd792d-6dd7957 728->732 729->732 733 6dd7654-6dd765e 729->733 735 6dd76ac-6dd76b8 730->735 731->735 732->716 736 6dd76be 735->736 737 6dd76ba-6dd76bc 735->737 740 6dd76c1-6dd76c3 736->740 737->740 740->741 742 6dd76c9-6dd76de 740->742 773 6dd79d6-6dd7a16 741->773 744 6dd76ee-6dd770b 742->744 745 6dd76e0-6dd76ec 742->745 747 6dd770f-6dd771b 744->747 745->747 748 6dd771d-6dd7722 747->748 749 6dd7724-6dd772d 747->749 751 6dd7730-6dd7732 748->751 749->751 753 6dd7738-6dd773a call 6dd7a78 751->753 754 6dd77ba-6dd77be 751->754 759 6dd7740-6dd7760 call 6dd73f8 753->759 757 6dd77c0-6dd77de 754->757 758 6dd77f2-6dd780a call 6dd72c0 754->758 757->758 770 6dd77e0-6dd77ed call 6dd73f8 757->770 777 6dd780f-6dd7839 call 6dd73f8 758->777 767 6dd7770-6dd778d 759->767 768 6dd7762-6dd776e 759->768 771 6dd7791-6dd779d 767->771 768->771 770->722 775 6dd779f-6dd77a4 771->775 776 6dd77a6-6dd77af 771->776 798 6dd7a1d-6dd7a76 773->798 779 6dd77b2-6dd77b4 775->779 776->779 785 6dd7849-6dd7866 777->785 786 6dd783b-6dd7847 777->786 779->754 779->773 787 6dd786a-6dd7876 785->787 786->787 789 6dd787c 787->789 790 6dd7878-6dd787a 787->790 791 6dd787f-6dd7881 789->791 790->791 791->722 793 6dd7887-6dd7897 791->793 794 6dd7899-6dd78a5 793->794 795 6dd78a7-6dd78c4 793->795 797 6dd78c8-6dd78d4 794->797 795->797 799 6dd78dd-6dd78e6 797->799 800 6dd78d6-6dd78db 797->800 801 6dd78e9-6dd78eb 799->801 800->801 801->798 803 6dd78f1 801->803 803->717
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: Hbq$Hbq$Hbq$Hbq$Hbq
                    • API String ID: 0-1677660839
                    • Opcode ID: eabc11e4d63055dd9c609b03f236c80ac47cd1014af854e9da6f8515be99947e
                    • Instruction ID: 48cb4b231f29be970e6a7a29a142ad8a0bacf90f3417a8854fa592d635659363
                    • Opcode Fuzzy Hash: eabc11e4d63055dd9c609b03f236c80ac47cd1014af854e9da6f8515be99947e
                    • Instruction Fuzzy Hash: 5BF19231E10256CFCB55DF75C4502BDFBB2FF85300F248AAAD456AB241EB789A85CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 810 6dd3be0-6dd3c0b 811 6dd3c0d 810->811 812 6dd3c12-6dd3cae 810->812 811->812 815 6dd3d00-6dd50a2 812->815 816 6dd3cb0-6dd3cfa 812->816 824 6dd50a8-6dd50ce 815->824 825 6dd3d40-6dd3ecf 815->825 816->815 827 6dd50dd 824->827 828 6dd50d0-6dd50dc 824->828 843 6dd5041-6dd505b 825->843 832 6dd50de 827->832 828->827 832->832 845 6dd3ed4-6dd4018 843->845 846 6dd5061-6dd5085 843->846 863 6dd404b-6dd4092 845->863 864 6dd401a-6dd4046 845->864 851 6dd5086 846->851 851->851 869 6dd4094-6dd40b5 863->869 870 6dd40b7-6dd40c6 863->870 867 6dd40d9-6dd4290 864->867 892 6dd42e2-6dd42ed 867->892 893 6dd4292-6dd42dc 867->893 875 6dd40cc-6dd40d8 869->875 870->875 875->867 1058 6dd42f3 call 6dd55f8 892->1058 1059 6dd42f3 call 6dd55a8 892->1059 893->892 894 6dd42f9-6dd435d 900 6dd43af-6dd43ba 894->900 901 6dd435f-6dd43a9 894->901 1056 6dd43c0 call 6dd55f8 900->1056 1057 6dd43c0 call 6dd55a8 900->1057 901->900 902 6dd43c6-6dd4429 908 6dd447b-6dd4486 902->908 909 6dd442b-6dd4475 902->909 1052 6dd448c call 6dd55f8 908->1052 1053 6dd448c call 6dd55a8 908->1053 909->908 910 6dd4492-6dd44cb 914 6dd4944-6dd49cb 910->914 915 6dd44d1-6dd4534 910->915 926 6dd49cd-6dd4a23 914->926 927 6dd4a29-6dd4a34 914->927 923 6dd453b-6dd458d LdrInitializeThunk call 6dd3544 915->923 924 6dd4536 915->924 934 6dd4592-6dd46ba call 6dd0a10 call 6dd39f0 call 6dd318c call 6dd319c 923->934 924->923 926->927 1060 6dd4a3a call 6dd55f8 927->1060 1061 6dd4a3a call 6dd55a8 927->1061 931 6dd4a40-6dd4acd 944 6dd4acf-6dd4b25 931->944 945 6dd4b2b-6dd4b36 931->945 969 6dd4927-6dd4943 934->969 970 6dd46c0-6dd4712 934->970 944->945 1054 6dd4b3c call 6dd55f8 945->1054 1055 6dd4b3c call 6dd55a8 945->1055 948 6dd4b42-6dd4bba 961 6dd4bbc-6dd4c12 948->961 962 6dd4c18-6dd4c23 948->962 961->962 1050 6dd4c29 call 6dd55f8 962->1050 1051 6dd4c29 call 6dd55a8 962->1051 964 6dd4c2f-6dd4c9b 979 6dd4ced-6dd4cf8 964->979 980 6dd4c9d-6dd4ce7 964->980 969->914 977 6dd4764-6dd47df 970->977 978 6dd4714-6dd475e 970->978 993 6dd4831-6dd48ab 977->993 994 6dd47e1-6dd482b 977->994 978->977 1062 6dd4cfe call 6dd55f8 979->1062 1063 6dd4cfe call 6dd55a8 979->1063 980->979 981 6dd4d04-6dd4d49 995 6dd4e7f-6dd5028 981->995 996 6dd4d4f-6dd4e7e 981->996 1009 6dd48fd-6dd4926 993->1009 1010 6dd48ad-6dd48f7 993->1010 994->993 1047 6dd502a-6dd503f 995->1047 1048 6dd5040 995->1048 996->995 1009->969 1010->1009 1047->1048 1048->843 1050->964 1051->964 1052->910 1053->910 1054->948 1055->948 1056->902 1057->902 1058->894 1059->894 1060->931 1061->931 1062->981 1063->981
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: ;)$s)
                    • API String ID: 0-1670427759
                    • Opcode ID: 2e19a39ff16eb806d2e44ebfbb1e2b094ec1faf5f0e202be41c6b8170dd9289d
                    • Instruction ID: eed2273e910ff163d72afb3fc5ed01f320636d6c097eb7d84f4fe4f7a763037f
                    • Opcode Fuzzy Hash: 2e19a39ff16eb806d2e44ebfbb1e2b094ec1faf5f0e202be41c6b8170dd9289d
                    • Instruction Fuzzy Hash: 33C2AD74A112299FCBA4EF28D898B9DBBB1FB49304F1085E9D40DA7350DB35AE85CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1064 72484f8-7248518 1065 724851f-7248614 1064->1065 1066 724851a 1064->1066 1075 7248616 1065->1075 1076 724861b-7248649 1065->1076 1066->1065 1075->1076 1078 72489f1-72489fa 1076->1078 1079 7248a00-7248a82 1078->1079 1080 724864e-7248657 1078->1080 1094 7248a84 1079->1094 1095 7248a89-7248ab7 1079->1095 1081 724865e-724873d 1080->1081 1082 7248659 1080->1082 1113 7248744-7248778 1081->1113 1082->1081 1094->1095 1099 7248e74-7248e7d 1095->1099 1100 7248e83-7248eb3 1099->1100 1101 7248abc-7248ac5 1099->1101 1104 7248ac7 1101->1104 1105 7248acc-7248bab 1101->1105 1104->1105 1136 7248bb2-7248be6 1105->1136 1117 724891b-724892f 1113->1117 1120 7248935-7248952 1117->1120 1121 724877d-7248815 1117->1121 1124 7248954-7248960 1120->1124 1125 7248961 1120->1125 1139 7248817-724882f 1121->1139 1140 7248831 1121->1140 1124->1125 1125->1078 1141 7248d9b-7248daf 1136->1141 1142 7248837-7248858 1139->1142 1140->1142 1147 7248db5-7248dd2 1141->1147 1148 7248beb-7248c89 1141->1148 1145 724885e-72488d9 1142->1145 1146 724890a-724891a 1142->1146 1164 72488f5 1145->1164 1165 72488db-72488f3 1145->1165 1146->1117 1151 7248dd4-7248de0 1147->1151 1152 7248de1 1147->1152 1168 7248ca5 1148->1168 1169 7248c8b-7248ca3 1148->1169 1151->1152 1152->1099 1167 72488fb-7248909 1164->1167 1165->1167 1167->1146 1170 7248cab-7248ccc 1168->1170 1169->1170 1173 7248d87-7248d9a 1170->1173 1174 7248cd2-7248d56 1170->1174 1173->1141 1181 7248d72 1174->1181 1182 7248d58-7248d70 1174->1182 1183 7248d78-7248d86 1181->1183 1182->1183 1183->1173
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: $^q$$^q$$^q$$^q
                    • API String ID: 0-2125118731
                    • Opcode ID: bf8907979a26f52bb40e7bc9b93995b1a2d49fceed38cd51887b198630630413
                    • Instruction ID: 55ffd9dfa3bc1a8c710d6105f51f2aa5ed5efc15fc4659b3977a7cee241beb8a
                    • Opcode Fuzzy Hash: bf8907979a26f52bb40e7bc9b93995b1a2d49fceed38cd51887b198630630413
                    • Instruction Fuzzy Hash: BE32B270E11229DFDB68DF64C894BDEB7B2BF89300F1085A9D409AB250DB359E85CF50

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1379 6dd5770-6dd57a2 1380 6dd57a9-6dd5875 1379->1380 1381 6dd57a4 1379->1381 1386 6dd588a 1380->1386 1387 6dd5877-6dd5885 1380->1387 1381->1380 1450 6dd5890 call 6dd619a 1386->1450 1451 6dd5890 call 6dd6244 1386->1451 1452 6dd5890 call 6dd61b6 1386->1452 1453 6dd5890 call 6dd6126 1386->1453 1454 6dd5890 call 6dd6031 1386->1454 1455 6dd5890 call 6dd60e0 1386->1455 1388 6dd5d38-6dd5d45 1387->1388 1389 6dd5896-6dd5946 1397 6dd5cc7-6dd5cf1 1389->1397 1399 6dd594b-6dd5b61 1397->1399 1400 6dd5cf7-6dd5d36 1397->1400 1427 6dd5b6d-6dd5bb7 1399->1427 1400->1388 1430 6dd5bbf-6dd5bc1 1427->1430 1431 6dd5bb9 1427->1431 1434 6dd5bc8-6dd5bcf 1430->1434 1432 6dd5bbb-6dd5bbd 1431->1432 1433 6dd5bc3 1431->1433 1432->1430 1432->1433 1433->1434 1435 6dd5c49-6dd5c6f 1434->1435 1436 6dd5bd1-6dd5c48 1434->1436 1438 6dd5c7c-6dd5c88 1435->1438 1439 6dd5c71-6dd5c7a 1435->1439 1436->1435 1441 6dd5c8e-6dd5cad 1438->1441 1439->1441 1445 6dd5caf-6dd5cc2 1441->1445 1446 6dd5cc3-6dd5cc4 1441->1446 1445->1446 1446->1397 1450->1389 1451->1389 1452->1389 1453->1389 1454->1389 1455->1389
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: .$1
                    • API String ID: 0-1839485796
                    • Opcode ID: 8dfc20dfcabc381cae600aaaf9bdb7b931b3181398fc3e4935c23d8c62afac78
                    • Instruction ID: 1a1b094775fd832794d85fe0cae9222bbad1b6f80c3a7ea8eb1e676746d0c73e
                    • Opcode Fuzzy Hash: 8dfc20dfcabc381cae600aaaf9bdb7b931b3181398fc3e4935c23d8c62afac78
                    • Instruction Fuzzy Hash: D8F1DF74E01328CFDB68DF65D884B9DBBB2BF89305F5081A9D509AB290DB719E81CF10
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 60c58fe2566d5aae23ac03516168c0c7894808e2fcbe8007727ce8297b33523a
                    • Instruction ID: 387dac222c743a56f9332d19d6ebc055dc2fc9997237eacf9a6fe4cb764de71d
                    • Opcode Fuzzy Hash: 60c58fe2566d5aae23ac03516168c0c7894808e2fcbe8007727ce8297b33523a
                    • Instruction Fuzzy Hash: 9F82CDB4A10216DFDB65EF28D854B6977F1BB48308F1682E8C8099B392EB399C45DF41
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: aaf0c6be6d0403cbbb3421bbc0c4496bc19f8b765a97315fb418da9d003ef35f
                    • Instruction ID: 98891fe4952813929d0ccc184159c7d48494d4757c0e8b0a692c92abfe5f6dfe
                    • Opcode Fuzzy Hash: aaf0c6be6d0403cbbb3421bbc0c4496bc19f8b765a97315fb418da9d003ef35f
                    • Instruction Fuzzy Hash: 8B32CBB0B112059FEB19DFA9D594BAEBBF6AF89300F148469E105DB3A1CB74EC01CB51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c854186846de4cc75ac60acb00bad0b0da68fbd5b5380a35e1923f0b3c0bf43b
                    • Instruction ID: e54624d46ba52545b38a496592178b4b9786288680efd31330243ed8ebe8626f
                    • Opcode Fuzzy Hash: c854186846de4cc75ac60acb00bad0b0da68fbd5b5380a35e1923f0b3c0bf43b
                    • Instruction Fuzzy Hash: 7B229E74D00229CFDB64DF68C994BD9B7B2BF89300F5085EAD549A7250EB30AE85CF90
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 348877640223826506f882dc9fd69f96592b80ace2486ce263354a1d8a30a764
                    • Instruction ID: 0751e7d285428d9e0372b0fd6e5dc9b55682a0823bc03e18ba71eba8916f360c
                    • Opcode Fuzzy Hash: 348877640223826506f882dc9fd69f96592b80ace2486ce263354a1d8a30a764
                    • Instruction Fuzzy Hash: CB02A074A01229CFDB68DF64C994B9EBBB2BF89300F1085E9D409A7354DB31AE85CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 3536a81137e4df8b2118185906fb907fa1f320a9c703ca2832a9cc5169349bcb
                    • Instruction ID: a49da1f48d46d0cac0f9a4319f7bc444bd32f1bf71cbf32a6e3dc4c081347e7e
                    • Opcode Fuzzy Hash: 3536a81137e4df8b2118185906fb907fa1f320a9c703ca2832a9cc5169349bcb
                    • Instruction Fuzzy Hash: 2091F574D01229DFDB64EFA8D944B9DBBB2BF4A304F1081A9D449B7350DB309A85CF51

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1651 51bae30-51bae3f 1652 51bae6b-51bae6f 1651->1652 1653 51bae41-51bae4e call 51b9838 1651->1653 1655 51bae83-51baec4 1652->1655 1656 51bae71-51bae7b 1652->1656 1659 51bae50 1653->1659 1660 51bae64 1653->1660 1662 51baed1-51baedf 1655->1662 1663 51baec6-51baece 1655->1663 1656->1655 1708 51bae56 call 51bb0b8 1659->1708 1709 51bae56 call 51bb0c8 1659->1709 1660->1652 1664 51baf03-51baf05 1662->1664 1665 51baee1-51baee6 1662->1665 1663->1662 1670 51baf08-51baf0f 1664->1670 1667 51baee8-51baeef call 51ba814 1665->1667 1668 51baef1 1665->1668 1666 51bae5c-51bae5e 1666->1660 1669 51bafa0-51bafb7 1666->1669 1672 51baef3-51baf01 1667->1672 1668->1672 1684 51bafb9-51bb018 1669->1684 1673 51baf1c-51baf23 1670->1673 1674 51baf11-51baf19 1670->1674 1672->1670 1677 51baf30-51baf39 call 51ba824 1673->1677 1678 51baf25-51baf2d 1673->1678 1674->1673 1682 51baf3b-51baf43 1677->1682 1683 51baf46-51baf4b 1677->1683 1678->1677 1682->1683 1685 51baf69-51baf76 1683->1685 1686 51baf4d-51baf54 1683->1686 1702 51bb01a-51bb060 1684->1702 1693 51baf99-51baf9f 1685->1693 1694 51baf78-51baf96 1685->1694 1686->1685 1687 51baf56-51baf66 call 51ba834 call 51ba844 1686->1687 1687->1685 1694->1693 1703 51bb068-51bb093 GetModuleHandleW 1702->1703 1704 51bb062-51bb065 1702->1704 1705 51bb09c-51bb0b0 1703->1705 1706 51bb095-51bb09b 1703->1706 1704->1703 1706->1705 1708->1666 1709->1666
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 51a54d0ffa6207cf4e73e467b86e1e06b59abab3fdb90a530c13e71679849219
                    • Instruction ID: 81a96477c37cc11e8a85ce0a85581d2650e1a38c843d842381f701e11e966705
                    • Opcode Fuzzy Hash: 51a54d0ffa6207cf4e73e467b86e1e06b59abab3fdb90a530c13e71679849219
                    • Instruction Fuzzy Hash: 097129B0A00B058FE724DF69D5457AABBF6FF48300F10892DE48AD7A50D7B9E945CB90

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 1710 51b4248-51b5a01 CreateActCtxA 1713 51b5a0a-51b5a64 1710->1713 1714 51b5a03-51b5a09 1710->1714 1721 51b5a73-51b5a77 1713->1721 1722 51b5a66-51b5a69 1713->1722 1714->1713 1723 51b5a79-51b5a85 1721->1723 1724 51b5a88 1721->1724 1722->1721 1723->1724 1725 51b5a89 1724->1725 1725->1725
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 051B59F1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: f13afbc35633f5864e5678153ff8f2f2ee64e6f1872bebd2083f6a210e0093fb
                    • Instruction ID: e6fd0d67a552fa00b6868381bd91ae34bdf840206fe82a2964afd63c532a3d60
                    • Opcode Fuzzy Hash: f13afbc35633f5864e5678153ff8f2f2ee64e6f1872bebd2083f6a210e0093fb
                    • Instruction Fuzzy Hash: 6041C1B0D00619CADB24DFA9C884BDDBBF6BF49304F24805AD408BB255EBB56985CF90
                    APIs
                    • CreateActCtxA.KERNEL32(?), ref: 051B59F1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: Create
                    • String ID:
                    • API String ID: 2289755597-0
                    • Opcode ID: d6790f94ed419b99c4783235d8a173cf342d4a422d28ecb6f2631b1619f8ccd4
                    • Instruction ID: 7ffb8c7bc00336b8edf0956a805179be67251704679e50928c620b5a8eb78c0f
                    • Opcode Fuzzy Hash: d6790f94ed419b99c4783235d8a173cf342d4a422d28ecb6f2631b1619f8ccd4
                    • Instruction Fuzzy Hash: C741D2B1D00619CADB24DFA9C888BCDBBF6FF49304F24805AD409BB255DBB56985CF90
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,051BB101,00000800,00000000,00000000), ref: 051BB312
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: f6067f38685947a17742d7fa27b34a9a4f59657586545577b1d281a273eec8ab
                    • Instruction ID: e552c1f6e2443f7e67575b7ef5ec3431b9604daf413c28b8c68c2698b439ecdd
                    • Opcode Fuzzy Hash: f6067f38685947a17742d7fa27b34a9a4f59657586545577b1d281a273eec8ab
                    • Instruction Fuzzy Hash: 2631DDB68093988FEB11DFAAC444BDEBFF4EF49310F04809AD495A7212C7B89545CFA5
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,051BD2C6,?,?,?,?,?), ref: 051BD387
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 178c2c80aaa02d6e44f7a4219c545277f7b6d3033b02c84466dd68efefb04680
                    • Instruction ID: 89602d5b37545abc9168771352896a8103e5f31a3f4f91ba29d645f902258746
                    • Opcode Fuzzy Hash: 178c2c80aaa02d6e44f7a4219c545277f7b6d3033b02c84466dd68efefb04680
                    • Instruction Fuzzy Hash: 9A21E4B5900218DFDB10CF9AD984BDEBBF8FB48310F14841AE918A7361D379A950CFA4
                    APIs
                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,051BD2C6,?,?,?,?,?), ref: 051BD387
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: DuplicateHandle
                    • String ID:
                    • API String ID: 3793708945-0
                    • Opcode ID: 420d373b950a4a245a786c5e130889924acd6ee60a99d0b259534af4f4e2583c
                    • Instruction ID: 3f360d75502a9025b6d6ee22851525a293348aa5108524af94be4a1c70559da6
                    • Opcode Fuzzy Hash: 420d373b950a4a245a786c5e130889924acd6ee60a99d0b259534af4f4e2583c
                    • Instruction Fuzzy Hash: 6F21E2B5900258DFDB10CFAAE585ADEBBF4FB48310F14841AE958A3251D378AA54CFA4
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,051BB101,00000800,00000000,00000000), ref: 051BB312
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 506eadb4bed63ffa115c3edd811eb20e18573e17ecf760f437fe4942b5407438
                    • Instruction ID: d85922be5b59a377718918bf4d0d59bcd8ad1e59fce33f29cb40e7a61f2ae50f
                    • Opcode Fuzzy Hash: 506eadb4bed63ffa115c3edd811eb20e18573e17ecf760f437fe4942b5407438
                    • Instruction Fuzzy Hash: 4A1114B69043498FDB10CF9AC444ADEFBF4EB48310F10842AD419A7610C3B5A945CFA4
                    APIs
                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,06DDB076), ref: 06DDB17E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: c0282191e27bcf5b75c7706f74fbbf6e832bb4fc8678d15d39961d6d0c34afcf
                    • Instruction ID: 30c576816fda9a45bf47d17a5a2bf7e0b9be6bff4e3b35dcd5ddfc877553c32c
                    • Opcode Fuzzy Hash: c0282191e27bcf5b75c7706f74fbbf6e832bb4fc8678d15d39961d6d0c34afcf
                    • Instruction Fuzzy Hash: B71123B5D002598FCB10DFAAC948ADEFBF4EF88314F14846AD458A7320C379A546CFA0
                    APIs
                    • LoadLibraryW.KERNELBASE(00000000,?,?,?,?,00000000,00000E20,?,?,06DDB076), ref: 06DDB17E
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 6dc3f8c7003858fdd40865b9debd02d88ca5a482d95f368a9011e77ba61879e9
                    • Instruction ID: 4e38a790244b6fed0312036a5a611e6cfc0206a2241702bb393f041a0f072c33
                    • Opcode Fuzzy Hash: 6dc3f8c7003858fdd40865b9debd02d88ca5a482d95f368a9011e77ba61879e9
                    • Instruction Fuzzy Hash: 0C1120B5D007498FCB20DF9AC848A9EFBF4EF88324F11842AD419A7210C379A945CFA4
                    APIs
                    • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,051BB101,00000800,00000000,00000000), ref: 051BB312
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: LibraryLoad
                    • String ID:
                    • API String ID: 1029625771-0
                    • Opcode ID: 7b2dade17e48a83655d131356021d107812a64e5873a8fe6a79336a509cc52b4
                    • Instruction ID: dd74a0156f268fa870166b356dafca06361cf176c9537490e9db762c3eab8031
                    • Opcode Fuzzy Hash: 7b2dade17e48a83655d131356021d107812a64e5873a8fe6a79336a509cc52b4
                    • Instruction Fuzzy Hash: 7711F3B6D043498FDB10CF9AD944BDEFBF4EB48310F14842AD429A7650C3B9A545CFA4
                    APIs
                    • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,051BAE4C), ref: 051BB086
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: HandleModule
                    • String ID:
                    • API String ID: 4139908857-0
                    • Opcode ID: 4999cabc296d7356cd3003397385ed5cf82b2638ecc9b331521bda49611bdb88
                    • Instruction ID: e8db87e6aaed4febb98a5ceb4061d11af8285b9ed2ea52fbc020cb4f1c93f7ce
                    • Opcode Fuzzy Hash: 4999cabc296d7356cd3003397385ed5cf82b2638ecc9b331521bda49611bdb88
                    • Instruction Fuzzy Hash: A2111FB58043088BDB20CF9AC444AEEBBF4EB49210F10842AD469B7610C3B5A949CFA4
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0724A105
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: 2e7a7c916a879e4351bfcb86c5b2bbbfd25c2e90639cc47b327ca277784963bc
                    • Instruction ID: bbfb4f10a9aa482cf95ad19cda8312e0c6ebc15c8a0a27f04c0975973a877f67
                    • Opcode Fuzzy Hash: 2e7a7c916a879e4351bfcb86c5b2bbbfd25c2e90639cc47b327ca277784963bc
                    • Instruction Fuzzy Hash: 8A1106B5810749DFCB10DF9AC489BDEBBF8EB48314F10841AE558A7200C3B5A944CFA5
                    APIs
                    • PostMessageW.USER32(?,00000010,00000000,?), ref: 0724A105
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID: MessagePost
                    • String ID:
                    • API String ID: 410705778-0
                    • Opcode ID: 638ee4f23113295b6d11aa6a0415003ccde417d622dea4acf10a5355221371dd
                    • Instruction ID: f01d95742ba75cf1507b2ea6f46dbc712a881d77c65d63bacb5da3428f768b6f
                    • Opcode Fuzzy Hash: 638ee4f23113295b6d11aa6a0415003ccde417d622dea4acf10a5355221371dd
                    • Instruction Fuzzy Hash: 3C11F5B5900259DFDB10CF9AD445BDEBBF8FB48324F20841AD558A7200C375AA44CFA5
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756712654.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_122d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 31810462a8b9da4e82d80124bf00332b326e95b6ed78fc3c0989b10beb005d29
                    • Instruction ID: 2f03e67af8ec554a460dc3ec7789c4d20d6f3ea587b14a0b0cae99e54664c56b
                    • Opcode Fuzzy Hash: 31810462a8b9da4e82d80124bf00332b326e95b6ed78fc3c0989b10beb005d29
                    • Instruction Fuzzy Hash: 05216775514208EFDB05DF48C9C0B6ABF65FB88324F20C16DE9094F256C37AE446CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756766380.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_123d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 216dfffbf7526093dae9621109388fc620d34c7da23b06b19bd607ff63fbcb69
                    • Instruction ID: 31b3405fee75e47dac7146ee99faa3b008d9c183791c42f20b074ec67e3a4695
                    • Opcode Fuzzy Hash: 216dfffbf7526093dae9621109388fc620d34c7da23b06b19bd607ff63fbcb69
                    • Instruction Fuzzy Hash: 9B2130B0614208DFCB11DF68D980B26FBA5EB84B14F60C569E90A4B256C37AD406CA61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756766380.000000000123D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0123D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_123d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 33756d8b4f719ad9cca1da437ab33c0a31313b4922a9b888174b99caff0ac726
                    • Instruction ID: 6d70480b00180710440c10c0f5cc7c3956ab1b8f4552d11b42500aadf76e8351
                    • Opcode Fuzzy Hash: 33756d8b4f719ad9cca1da437ab33c0a31313b4922a9b888174b99caff0ac726
                    • Instruction Fuzzy Hash: 6B2183755083849FCB02CF64D994711BF71EB86714F28C5DAD9498F2A7C33A981ACB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756712654.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_122d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction ID: 4094a1d18421e4a25d8c910b71f572316bf15828e52b957d4f602023ea9e7034
                    • Opcode Fuzzy Hash: 201b50b495cf87aa99c5283e85c62261d36f592a674eeeb3b47fc5aac64b1fd2
                    • Instruction Fuzzy Hash: 64110376404284DFDB12CF44D9C4B5ABF71FB94324F24C2A9D9090B257C33AE45ACBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756712654.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_122d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: b897e9307dea59e8badc623c7888dd33816bc9dd4a231e5cac64547c27ead3dc
                    • Instruction ID: f571ee171c11fc6263f8221c70d24e0e83e6343f4167ca48937ff44d98b70865
                    • Opcode Fuzzy Hash: b897e9307dea59e8badc623c7888dd33816bc9dd4a231e5cac64547c27ead3dc
                    • Instruction Fuzzy Hash: 2A01DB3111C358BAE7118F6DCD84F6BBF98EF45324F18C969EE494E186C679D840C671
                    Memory Dump Source
                    • Source File: 00000000.00000002.1756712654.000000000122D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0122D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_122d000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 958d62b4823a68c86234de81007969d2048529ad0cdd6500323388b7e6e33782
                    • Instruction ID: c2c44c059bb6d4edf6af1fd17be968e4230679a71274c432058a66a01fc4c16e
                    • Opcode Fuzzy Hash: 958d62b4823a68c86234de81007969d2048529ad0cdd6500323388b7e6e33782
                    • Instruction Fuzzy Hash: 78F06271508394AEE7118A1AC9C4B67FFA8EB41734F18C95AEE484E286C2799C44CA71
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR^q$PH^q
                    • API String ID: 0-4173805542
                    • Opcode ID: 566e0675a5e7aeeaba227bf08e2a0f5481caea0772d423d0123fd833a85d4c5c
                    • Instruction ID: 80386f5ebb4e02311dc500bae048aebca66f95aeb291f0356a6e6f6ac8b549b2
                    • Opcode Fuzzy Hash: 566e0675a5e7aeeaba227bf08e2a0f5481caea0772d423d0123fd833a85d4c5c
                    • Instruction Fuzzy Hash: 6FA10674E10229CFDB28DFA5C884B9EBBB2BF89300F1085A9D509AB354DB745E85CF41
                    Strings
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID: LR^q
                    • API String ID: 0-2625958711
                    • Opcode ID: 4687215484f187c21ed9223b3dfc54c51de1ec0e6f6650549f06abf41230845d
                    • Instruction ID: 5fc4a7c5a9ea61901dfe7f5b54e78679e2373b2b2e6f097d46e2a99e8d187e6a
                    • Opcode Fuzzy Hash: 4687215484f187c21ed9223b3dfc54c51de1ec0e6f6650549f06abf41230845d
                    • Instruction Fuzzy Hash: DC413CB1D053599FDB19DFA6C94069DBFF2BF8A300F14C4AAC404AB255DB38198ACF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 14149e721e2ada76b374827b990edc2ca45e9a4511024226787526885bddc82c
                    • Instruction ID: f3e27c49c663f10bdf8fc2912af0b33cee0abf0b1caec6b6571ee3c1c97816e9
                    • Opcode Fuzzy Hash: 14149e721e2ada76b374827b990edc2ca45e9a4511024226787526885bddc82c
                    • Instruction Fuzzy Hash: D442AD74E012289FDB64DF69C894BEDBBB2BF89300F1085E9D449A7264DB349E85CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 69cbe253c4abcc4d52266d0e0f2c33add354043a624068d2e8965f771b6ca51f
                    • Instruction ID: d1f414e4de8041a3f4f2ffcbe6536c47d629f3fafdba8fd2fdf3ef26477cd08b
                    • Opcode Fuzzy Hash: 69cbe253c4abcc4d52266d0e0f2c33add354043a624068d2e8965f771b6ca51f
                    • Instruction Fuzzy Hash: 59D1F931D20B5A9ACB00FB64D954AADB7B1FF95300F10CB9AD00937625FB706AC9CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f66577e05fd34f73b4870d065b4dbaa524c1b895d7de97a3f5dbf459972bb02d
                    • Instruction ID: b46b1a236c8ac1774cabdc797cd15558f9737c83c5327ce3ee4b1aa11b62fd38
                    • Opcode Fuzzy Hash: f66577e05fd34f73b4870d065b4dbaa524c1b895d7de97a3f5dbf459972bb02d
                    • Instruction Fuzzy Hash: 2DD1EA31D20B5A9ACB10FBA4D954AADB771FF95300F10CB9AD00937664FB706AC9CB91
                    Memory Dump Source
                    • Source File: 00000000.00000002.1760025659.00000000051B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 051B0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_51b0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0a08f23df419679c3eb94d8af1f66b24ff445c21d22b3b8144cfffbafd1d1426
                    • Instruction ID: 62166d80f76a1b28018241f09b18698fd7a6dd4c0b325a403a04bf54003c15a2
                    • Opcode Fuzzy Hash: 0a08f23df419679c3eb94d8af1f66b24ff445c21d22b3b8144cfffbafd1d1426
                    • Instruction Fuzzy Hash: 01A17136F002158FDF09DFB5D8445DEB7B2FF84300B1585AAE806AB265DBB1E946CB80
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 89e6e6ebbe83074dcd26b7eb854443b9acd1e5409394d9780213d98b935347ac
                    • Instruction ID: 99ab8c81673cf1469492b15fa28ebe6710b12b431f9be667cf52fc44ef7469f4
                    • Opcode Fuzzy Hash: 89e6e6ebbe83074dcd26b7eb854443b9acd1e5409394d9780213d98b935347ac
                    • Instruction Fuzzy Hash: 76B1D474E01229CFDB64DF65D884B9DBBB2BF89300F5085AAD409AB354DB349E85CF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: c2743c15e78967298da8205a64580ee2e177e9eb8f4b217ec9c14986a1994245
                    • Instruction ID: 656d3419533987ecca15095ee0da52405a155b59d4de484479fc5a57e2afc6c1
                    • Opcode Fuzzy Hash: c2743c15e78967298da8205a64580ee2e177e9eb8f4b217ec9c14986a1994245
                    • Instruction Fuzzy Hash: 1D91E970E002189FDB58EFB4D894A9EBBB6FF89300F208169D419AB354DB355D46DF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 9457fd7f5e2e9665a48632e6bb62dd43280a77de4333f6f7ad5e763174e6b137
                    • Instruction ID: 8b19705a94001c7ac05cbba26400fbde219dd3f9ee202ce58b96122502f7f9c8
                    • Opcode Fuzzy Hash: 9457fd7f5e2e9665a48632e6bb62dd43280a77de4333f6f7ad5e763174e6b137
                    • Instruction Fuzzy Hash: 1C81D970E002189FDB58EFA8D894A9EBBB2FF89300F208569D419AB354DB315D46DF50
                    Memory Dump Source
                    • Source File: 00000000.00000002.1764260526.0000000007240000.00000040.00000800.00020000.00000000.sdmp, Offset: 07240000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_7240000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: dbab1dea082ab3e66f2f2d22e2245ff4dfb38e87c471f8088c5e228c1464a940
                    • Instruction ID: 01be868f7ba300422c079c725d2e3ceabb0d85058f7f3ed4b5b31a44f31076a4
                    • Opcode Fuzzy Hash: dbab1dea082ab3e66f2f2d22e2245ff4dfb38e87c471f8088c5e228c1464a940
                    • Instruction Fuzzy Hash: 9951E5B0E102189FDB18DF69C880B9EBBB2BF89300F14C1A9D50DAB255DB345E86CF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ebcaf3913c0644a5e2b0a3addfda77248b3cad9ba85f5e77bc4182fce36baf35
                    • Instruction ID: dc63ff69c34dc2f58658615a957a814098fe080a7e9d0ca26d04474ebd04ebc9
                    • Opcode Fuzzy Hash: ebcaf3913c0644a5e2b0a3addfda77248b3cad9ba85f5e77bc4182fce36baf35
                    • Instruction Fuzzy Hash: 98510871E002599FEB68DF65D840BEEBBB2BF88300F1085EAD409A7254DB305E85DF51
                    Memory Dump Source
                    • Source File: 00000000.00000002.1763011097.0000000006DD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06DD0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_6dd0000_x4UbCbpqkP.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 09e792362beb1f03ca688bcaf23cae053e9386b3ed5058657b3e19687700d371
                    • Instruction ID: a69d4f08622897e8677254eb2fd9581cd700e331bcd43ee0e83a16ddea310ddb
                    • Opcode Fuzzy Hash: 09e792362beb1f03ca688bcaf23cae053e9386b3ed5058657b3e19687700d371
                    • Instruction Fuzzy Hash: F331F471E016199BEB68DFA6C8407DEFBB3AF89304F10C169D908AB254DB704A468F90